AuthenticationExploitBackupLeastprivilegeEDRWebapplicationfirewallUACCybercrimeCipherBruteforceEndpointsecuritySecurecodingCertificatePenetrationtestingProxyDomainhijackingIDSVulnerabilityMalvertisingMalwareAntivirusEncryptionAssetmanagementWormZero-dayFirewallThreathuntingSQLinjectionSocialengineeringOSINTZerotrustIncidentresponseZombieMFAThreatintelligenceInsiderthreatIPSSIEMIAMHashingMan-in-the-middleSecurityawarenessCryptographyBotnetVPNPrivilegeescalationAPTWhitehatTrojanCyberhygieneSupplychainattackPhishingC2serverCloudsecurityDatabreachCyberattackDigitalforensicsHoneypotAESSmishingAdwareSpoofingRiskassessmentFree!DecryptionSOCRansomwareThreatmodelingDDoSDigitalfootprintTokenizationReverseengineeringSpywareAuthenticationExploitBackupLeastprivilegeEDRWebapplicationfirewallUACCybercrimeCipherBruteforceEndpointsecuritySecurecodingCertificatePenetrationtestingProxyDomainhijackingIDSVulnerabilityMalvertisingMalwareAntivirusEncryptionAssetmanagementWormZero-dayFirewallThreathuntingSQLinjectionSocialengineeringOSINTZerotrustIncidentresponseZombieMFAThreatintelligenceInsiderthreatIPSSIEMIAMHashingMan-in-the-middleSecurityawarenessCryptographyBotnetVPNPrivilegeescalationAPTWhitehatTrojanCyberhygieneSupplychainattackPhishingC2serverCloudsecurityDatabreachCyberattackDigitalforensicsHoneypotAESSmishingAdwareSpoofingRiskassessmentFree!DecryptionSOCRansomwareThreatmodelingDDoSDigitalfootprintTokenizationReverseengineeringSpyware

APN Security Awareness Training 2025 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
  1. Authentication
  2. Exploit
  3. Backup
  4. Least privilege
  5. EDR
  6. Web application firewall
  7. UAC
  8. Cybercrime
  9. Cipher
  10. Brute force
  11. Endpoint security
  12. Secure coding
  13. Certificate
  14. Penetration testing
  15. Proxy
  16. Domain hijacking
  17. IDS
  18. Vulnerability
  19. Malvertising
  20. Malware
  21. Antivirus
  22. Encryption
  23. Asset management
  24. Worm
  25. Zero-day
  26. Firewall
  27. Threat hunting
  28. SQL injection
  29. Social engineering
  30. OSINT
  31. Zero trust
  32. Incident response
  33. Zombie
  34. MFA
  35. Threat intelligence
  36. Insider threat
  37. IPS
  38. SIEM
  39. IAM
  40. Hashing
  41. Man-in-the-middle
  42. Security awareness
  43. Cryptography
  44. Botnet
  45. VPN
  46. Privilege escalation
  47. APT
  48. White hat
  49. Trojan
  50. Cyber hygiene
  51. Supply chain attack
  52. Phishing
  53. C2 server
  54. Cloud security
  55. Data breach
  56. Cyberattack
  57. Digital forensics
  58. Honeypot
  59. AES
  60. Smishing
  61. Adware
  62. Spoofing
  63. Risk assessment
  64. Free!
  65. Decryption
  66. SOC
  67. Ransomware
  68. Threat modeling
  69. DDoS
  70. Digital footprint
  71. Tokenization
  72. Reverse engineering
  73. Spyware