ImposterScamsUpdatingPro TipsHolidayShoppingScamPasswords,Managers,and MFASecuring YourComputerFromEavesdroppingOnlineTrackingCharityScamsCredentialStuffingAttacksIoT andSmartDevicesFitnessScamsCyberIncidentPrep Part1MFAFatigueAttacksAttackSurfaces:Physicaland DigitalBruteForceAttacksTransportationScamsMarketplaceScamsQRCodePhishingHow toKeep YourBluetoothHappySecuring YourMobile DevicefromEavesdroppingRecognizingandReportingPhishingTheCyberTwilightZoneDisplayNameScamsSecuring YourSmart Homeand IOTDevices FromEavesdroppingDeliveryScamsDoes YourDeviceHaveMalware?AttackVectors:Active andPassiveImposterScamsUpdatingPro TipsHolidayShoppingScamPasswords,Managers,and MFASecuring YourComputerFromEavesdroppingOnlineTrackingCharityScamsCredentialStuffingAttacksIoT andSmartDevicesFitnessScamsCyberIncidentPrep Part1MFAFatigueAttacksAttackSurfaces:Physicaland DigitalBruteForceAttacksTransportationScamsMarketplaceScamsQRCodePhishingHow toKeep YourBluetoothHappySecuring YourMobile DevicefromEavesdroppingRecognizingandReportingPhishingTheCyberTwilightZoneDisplayNameScamsSecuring YourSmart Homeand IOTDevices FromEavesdroppingDeliveryScamsDoes YourDeviceHaveMalware?AttackVectors:Active andPassive

Cybersecurity Training Bingo Page 3 - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
N
2
I
3
O
4
N
5
B
6
B
7
G
8
I
9
I
10
G
11
I
12
G
13
B
14
O
15
I
16
N
17
N
18
B
19
O
20
B
21
O
22
O
23
G
24
B
25
G
26
I
  1. N-Imposter Scams
  2. I-Updating Pro Tips
  3. O-Holiday Shopping Scam
  4. N-Passwords, Managers, and MFA
  5. B-Securing Your Computer From Eavesdropping
  6. B-Online Tracking
  7. G-Charity Scams
  8. I- Credential Stuffing Attacks
  9. I-IoT and Smart Devices
  10. G-Fitness Scams
  11. I-Cyber Incident Prep Part 1
  12. G-MFA Fatigue Attacks
  13. B-Attack Surfaces: Physical and Digital
  14. O-Brute Force Attacks
  15. I-Transportation Scams
  16. N-Marketplace Scams
  17. N-QR Code Phishing
  18. B-How to Keep Your Bluetooth Happy
  19. O-Securing Your Mobile Device from Eavesdropping
  20. B-Recognizing and Reporting Phishing
  21. O-The Cyber Twilight Zone
  22. O-Display Name Scams
  23. G-Securing Your Smart Home and IOT Devices From Eavesdropping
  24. B-Delivery Scams
  25. G-Does Your Device Have Malware?
  26. I-Attack Vectors: Active and Passive