APTOSINTThreathuntingUACRansomwareC2serverSecurityawarenessZombieEncryptionEndpointsecurityDomainhijackingMFAVulnerabilityIncidentresponseVPNDecryptionWhitehatAdwareDigitalfootprintHashingWebapplicationfirewallThreatintelligencePhishingTokenizationReverseengineeringInsiderthreatPrivilegeescalationDatabreachSOCAntivirusCryptographySIEMAssetmanagementEDRCyberattackPenetrationtestingWormRiskassessmentTrojanIPSCybercrimeExploitMan-in-the-middleBotnetCipherProxyZerotrustSmishingDigitalforensicsSpoofingAuthenticationSocialengineeringHoneypotBackupSpywareLeastprivilegeFree!SupplychainattackDDoSCloudsecurityZero-dayIAMSQLinjectionIDSMalvertisingBruteforceFirewallMalwareSecurecodingCyberhygieneAESThreatmodelingCertificateAPTOSINTThreathuntingUACRansomwareC2serverSecurityawarenessZombieEncryptionEndpointsecurityDomainhijackingMFAVulnerabilityIncidentresponseVPNDecryptionWhitehatAdwareDigitalfootprintHashingWebapplicationfirewallThreatintelligencePhishingTokenizationReverseengineeringInsiderthreatPrivilegeescalationDatabreachSOCAntivirusCryptographySIEMAssetmanagementEDRCyberattackPenetrationtestingWormRiskassessmentTrojanIPSCybercrimeExploitMan-in-the-middleBotnetCipherProxyZerotrustSmishingDigitalforensicsSpoofingAuthenticationSocialengineeringHoneypotBackupSpywareLeastprivilegeFree!SupplychainattackDDoSCloudsecurityZero-dayIAMSQLinjectionIDSMalvertisingBruteforceFirewallMalwareSecurecodingCyberhygieneAESThreatmodelingCertificate

APN Security Awareness Training 2025 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
  1. APT
  2. OSINT
  3. Threat hunting
  4. UAC
  5. Ransomware
  6. C2 server
  7. Security awareness
  8. Zombie
  9. Encryption
  10. Endpoint security
  11. Domain hijacking
  12. MFA
  13. Vulnerability
  14. Incident response
  15. VPN
  16. Decryption
  17. White hat
  18. Adware
  19. Digital footprint
  20. Hashing
  21. Web application firewall
  22. Threat intelligence
  23. Phishing
  24. Tokenization
  25. Reverse engineering
  26. Insider threat
  27. Privilege escalation
  28. Data breach
  29. SOC
  30. Antivirus
  31. Cryptography
  32. SIEM
  33. Asset management
  34. EDR
  35. Cyberattack
  36. Penetration testing
  37. Worm
  38. Risk assessment
  39. Trojan
  40. IPS
  41. Cybercrime
  42. Exploit
  43. Man-in-the-middle
  44. Botnet
  45. Cipher
  46. Proxy
  47. Zero trust
  48. Smishing
  49. Digital forensics
  50. Spoofing
  51. Authentication
  52. Social engineering
  53. Honeypot
  54. Backup
  55. Spyware
  56. Least privilege
  57. Free!
  58. Supply chain attack
  59. DDoS
  60. Cloud security
  61. Zero-day
  62. IAM
  63. SQL injection
  64. IDS
  65. Malvertising
  66. Brute force
  67. Firewall
  68. Malware
  69. Secure coding
  70. Cyber hygiene
  71. AES
  72. Threat modeling
  73. Certificate