InsiderthreatRansomwarePenetrationtestingZombieSIEMBackupUACTokenizationCertificateAssetmanagementLeastprivilegeDDoSDigitalfootprintIncidentresponseRiskassessmentMFAVulnerabilitySocialengineeringBotnetAPTMan-in-the-middleSecurecodingPhishingSpoofingWhitehatProxyIDSCryptographyFirewallWormHashingDatabreachMalvertisingSOCEDRAdwareHoneypotFree!SmishingWebapplicationfirewallBruteforceCloudsecurityCipherIPSAESAuthenticationCyberattackMalwareZero-daySQLinjectionDomainhijackingSupplychainattackC2serverDigitalforensicsPrivilegeescalationThreathuntingCyberhygieneEndpointsecurityTrojanReverseengineeringVPNThreatintelligenceSecurityawarenessZerotrustExploitEncryptionSpywareDecryptionCybercrimeThreatmodelingAntivirusIAMOSINTInsiderthreatRansomwarePenetrationtestingZombieSIEMBackupUACTokenizationCertificateAssetmanagementLeastprivilegeDDoSDigitalfootprintIncidentresponseRiskassessmentMFAVulnerabilitySocialengineeringBotnetAPTMan-in-the-middleSecurecodingPhishingSpoofingWhitehatProxyIDSCryptographyFirewallWormHashingDatabreachMalvertisingSOCEDRAdwareHoneypotFree!SmishingWebapplicationfirewallBruteforceCloudsecurityCipherIPSAESAuthenticationCyberattackMalwareZero-daySQLinjectionDomainhijackingSupplychainattackC2serverDigitalforensicsPrivilegeescalationThreathuntingCyberhygieneEndpointsecurityTrojanReverseengineeringVPNThreatintelligenceSecurityawarenessZerotrustExploitEncryptionSpywareDecryptionCybercrimeThreatmodelingAntivirusIAMOSINT

APN Security Awareness Training 2025 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
  1. Insider threat
  2. Ransomware
  3. Penetration testing
  4. Zombie
  5. SIEM
  6. Backup
  7. UAC
  8. Tokenization
  9. Certificate
  10. Asset management
  11. Least privilege
  12. DDoS
  13. Digital footprint
  14. Incident response
  15. Risk assessment
  16. MFA
  17. Vulnerability
  18. Social engineering
  19. Botnet
  20. APT
  21. Man-in-the-middle
  22. Secure coding
  23. Phishing
  24. Spoofing
  25. White hat
  26. Proxy
  27. IDS
  28. Cryptography
  29. Firewall
  30. Worm
  31. Hashing
  32. Data breach
  33. Malvertising
  34. SOC
  35. EDR
  36. Adware
  37. Honeypot
  38. Free!
  39. Smishing
  40. Web application firewall
  41. Brute force
  42. Cloud security
  43. Cipher
  44. IPS
  45. AES
  46. Authentication
  47. Cyberattack
  48. Malware
  49. Zero-day
  50. SQL injection
  51. Domain hijacking
  52. Supply chain attack
  53. C2 server
  54. Digital forensics
  55. Privilege escalation
  56. Threat hunting
  57. Cyber hygiene
  58. Endpoint security
  59. Trojan
  60. Reverse engineering
  61. VPN
  62. Threat intelligence
  63. Security awareness
  64. Zero trust
  65. Exploit
  66. Encryption
  67. Spyware
  68. Decryption
  69. Cybercrime
  70. Threat modeling
  71. Antivirus
  72. IAM
  73. OSINT