WebapplicationfirewallOSINTExploitEDRTokenizationCryptographyWormAdwareAPTPrivilegeescalationSpywareMalwareCybercrimeInsiderthreatZero-dayLeastprivilegeUACEndpointsecurityAntivirusAESWhitehatVulnerabilityDigitalforensicsAuthenticationDDoSSIEMMFASOCIPSCyberattackSpoofingIncidentresponseBotnetMan-in-the-middleHashingVPNThreathuntingEncryptionZombieFree!ThreatintelligenceDecryptionIDSCloudsecuritySecurityawarenessBackupFirewallDatabreachSocialengineeringZerotrustTrojanThreatmodelingSecurecodingCyberhygieneDomainhijackingDigitalfootprintMalvertisingReverseengineeringPhishingIAMHoneypotSupplychainattackPenetrationtestingRiskassessmentCertificateBruteforceAssetmanagementSQLinjectionC2serverRansomwareProxySmishingCipherWebapplicationfirewallOSINTExploitEDRTokenizationCryptographyWormAdwareAPTPrivilegeescalationSpywareMalwareCybercrimeInsiderthreatZero-dayLeastprivilegeUACEndpointsecurityAntivirusAESWhitehatVulnerabilityDigitalforensicsAuthenticationDDoSSIEMMFASOCIPSCyberattackSpoofingIncidentresponseBotnetMan-in-the-middleHashingVPNThreathuntingEncryptionZombieFree!ThreatintelligenceDecryptionIDSCloudsecuritySecurityawarenessBackupFirewallDatabreachSocialengineeringZerotrustTrojanThreatmodelingSecurecodingCyberhygieneDomainhijackingDigitalfootprintMalvertisingReverseengineeringPhishingIAMHoneypotSupplychainattackPenetrationtestingRiskassessmentCertificateBruteforceAssetmanagementSQLinjectionC2serverRansomwareProxySmishingCipher

APN Security Awareness Training 2025 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
  1. Web application firewall
  2. OSINT
  3. Exploit
  4. EDR
  5. Tokenization
  6. Cryptography
  7. Worm
  8. Adware
  9. APT
  10. Privilege escalation
  11. Spyware
  12. Malware
  13. Cybercrime
  14. Insider threat
  15. Zero-day
  16. Least privilege
  17. UAC
  18. Endpoint security
  19. Antivirus
  20. AES
  21. White hat
  22. Vulnerability
  23. Digital forensics
  24. Authentication
  25. DDoS
  26. SIEM
  27. MFA
  28. SOC
  29. IPS
  30. Cyberattack
  31. Spoofing
  32. Incident response
  33. Botnet
  34. Man-in-the-middle
  35. Hashing
  36. VPN
  37. Threat hunting
  38. Encryption
  39. Zombie
  40. Free!
  41. Threat intelligence
  42. Decryption
  43. IDS
  44. Cloud security
  45. Security awareness
  46. Backup
  47. Firewall
  48. Data breach
  49. Social engineering
  50. Zero trust
  51. Trojan
  52. Threat modeling
  53. Secure coding
  54. Cyber hygiene
  55. Domain hijacking
  56. Digital footprint
  57. Malvertising
  58. Reverse engineering
  59. Phishing
  60. IAM
  61. Honeypot
  62. Supply chain attack
  63. Penetration testing
  64. Risk assessment
  65. Certificate
  66. Brute force
  67. Asset management
  68. SQL injection
  69. C2 server
  70. Ransomware
  71. Proxy
  72. Smishing
  73. Cipher