ZombieCybercrimeFirewallProxyDomainhijackingAuthenticationHoneypotSpywareTokenizationDecryptionRansomwareSQLinjectionPhishingCyberhygieneAESEndpointsecurityAdwareAPTSIEMBackupSecurecodingCloudsecurityMalvertisingBruteforceSupplychainattackWhitehatHashingEncryptionWormVulnerabilityTrojanDatabreachAssetmanagementPrivilegeescalationBotnetZero-dayLeastprivilegeThreatmodelingSmishingC2serverDDoSSocialengineeringOSINTUACIPSVPNFree!EDRMalwareIncidentresponseSpoofingMFARiskassessmentDigitalfootprintReverseengineeringInsiderthreatCertificateIDSCipherThreathuntingAntivirusZerotrustIAMCyberattackExploitSOCDigitalforensicsThreatintelligenceMan-in-the-middleSecurityawarenessPenetrationtestingWebapplicationfirewallCryptographyZombieCybercrimeFirewallProxyDomainhijackingAuthenticationHoneypotSpywareTokenizationDecryptionRansomwareSQLinjectionPhishingCyberhygieneAESEndpointsecurityAdwareAPTSIEMBackupSecurecodingCloudsecurityMalvertisingBruteforceSupplychainattackWhitehatHashingEncryptionWormVulnerabilityTrojanDatabreachAssetmanagementPrivilegeescalationBotnetZero-dayLeastprivilegeThreatmodelingSmishingC2serverDDoSSocialengineeringOSINTUACIPSVPNFree!EDRMalwareIncidentresponseSpoofingMFARiskassessmentDigitalfootprintReverseengineeringInsiderthreatCertificateIDSCipherThreathuntingAntivirusZerotrustIAMCyberattackExploitSOCDigitalforensicsThreatintelligenceMan-in-the-middleSecurityawarenessPenetrationtestingWebapplicationfirewallCryptography

APN Security Awareness Training 2025 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
  1. Zombie
  2. Cybercrime
  3. Firewall
  4. Proxy
  5. Domain hijacking
  6. Authentication
  7. Honeypot
  8. Spyware
  9. Tokenization
  10. Decryption
  11. Ransomware
  12. SQL injection
  13. Phishing
  14. Cyber hygiene
  15. AES
  16. Endpoint security
  17. Adware
  18. APT
  19. SIEM
  20. Backup
  21. Secure coding
  22. Cloud security
  23. Malvertising
  24. Brute force
  25. Supply chain attack
  26. White hat
  27. Hashing
  28. Encryption
  29. Worm
  30. Vulnerability
  31. Trojan
  32. Data breach
  33. Asset management
  34. Privilege escalation
  35. Botnet
  36. Zero-day
  37. Least privilege
  38. Threat modeling
  39. Smishing
  40. C2 server
  41. DDoS
  42. Social engineering
  43. OSINT
  44. UAC
  45. IPS
  46. VPN
  47. Free!
  48. EDR
  49. Malware
  50. Incident response
  51. Spoofing
  52. MFA
  53. Risk assessment
  54. Digital footprint
  55. Reverse engineering
  56. Insider threat
  57. Certificate
  58. IDS
  59. Cipher
  60. Threat hunting
  61. Antivirus
  62. Zero trust
  63. IAM
  64. Cyberattack
  65. Exploit
  66. SOC
  67. Digital forensics
  68. Threat intelligence
  69. Man-in-the-middle
  70. Security awareness
  71. Penetration testing
  72. Web application firewall
  73. Cryptography