SupplychainattackPrivilegeescalationReverseengineeringSpoofingCyberhygieneInsiderthreatBackupSmishingWhitehatOSINTCryptographyThreatintelligenceSocialengineeringCybercrimeEDRHashingPhishingDatabreachFirewallFree!CertificateC2serverSIEMAuthenticationTrojanIAMAssetmanagementTokenizationBotnetAdwareWormZombieHoneypotCyberattackSpywareDDoSSecurecodingSecurityawarenessCloudsecurityAntivirusThreatmodelingProxyPenetrationtestingZerotrustAPTDecryptionLeastprivilegeVPNExploitDomainhijackingThreathuntingSQLinjectionRiskassessmentRansomwareVulnerabilityBruteforceSOCDigitalfootprintMalwareWebapplicationfirewallCipherMalvertisingDigitalforensicsUACZero-dayMFAIncidentresponseAESEncryptionEndpointsecurityIDSMan-in-the-middleIPSSupplychainattackPrivilegeescalationReverseengineeringSpoofingCyberhygieneInsiderthreatBackupSmishingWhitehatOSINTCryptographyThreatintelligenceSocialengineeringCybercrimeEDRHashingPhishingDatabreachFirewallFree!CertificateC2serverSIEMAuthenticationTrojanIAMAssetmanagementTokenizationBotnetAdwareWormZombieHoneypotCyberattackSpywareDDoSSecurecodingSecurityawarenessCloudsecurityAntivirusThreatmodelingProxyPenetrationtestingZerotrustAPTDecryptionLeastprivilegeVPNExploitDomainhijackingThreathuntingSQLinjectionRiskassessmentRansomwareVulnerabilityBruteforceSOCDigitalfootprintMalwareWebapplicationfirewallCipherMalvertisingDigitalforensicsUACZero-dayMFAIncidentresponseAESEncryptionEndpointsecurityIDSMan-in-the-middleIPS

APN Security Awareness Training 2025 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
  1. Supply chain attack
  2. Privilege escalation
  3. Reverse engineering
  4. Spoofing
  5. Cyber hygiene
  6. Insider threat
  7. Backup
  8. Smishing
  9. White hat
  10. OSINT
  11. Cryptography
  12. Threat intelligence
  13. Social engineering
  14. Cybercrime
  15. EDR
  16. Hashing
  17. Phishing
  18. Data breach
  19. Firewall
  20. Free!
  21. Certificate
  22. C2 server
  23. SIEM
  24. Authentication
  25. Trojan
  26. IAM
  27. Asset management
  28. Tokenization
  29. Botnet
  30. Adware
  31. Worm
  32. Zombie
  33. Honeypot
  34. Cyberattack
  35. Spyware
  36. DDoS
  37. Secure coding
  38. Security awareness
  39. Cloud security
  40. Antivirus
  41. Threat modeling
  42. Proxy
  43. Penetration testing
  44. Zero trust
  45. APT
  46. Decryption
  47. Least privilege
  48. VPN
  49. Exploit
  50. Domain hijacking
  51. Threat hunting
  52. SQL injection
  53. Risk assessment
  54. Ransomware
  55. Vulnerability
  56. Brute force
  57. SOC
  58. Digital footprint
  59. Malware
  60. Web application firewall
  61. Cipher
  62. Malvertising
  63. Digital forensics
  64. UAC
  65. Zero-day
  66. MFA
  67. Incident response
  68. AES
  69. Encryption
  70. Endpoint security
  71. IDS
  72. Man-in-the-middle
  73. IPS