TransportationScamsDeliveryScamsImposterScamsAttackSurfaces:Physicaland DigitalAttackVectors:Active andPassiveIoT andSmartDevicesCyberIncidentPrep Part1Securing YourMobile DevicefromEavesdroppingHolidayShoppingScamMarketplaceScamsDisplayNameScamsDoes YourDeviceHaveMalware?How toKeep YourBluetoothHappyBruteForceAttacksSecuring YourSmart Homeand IOTDevices FromEavesdroppingQRCodePhishingOnlineTrackingSecuring YourComputerFromEavesdroppingPasswords,Managers,and MFAUpdatingPro TipsCredentialStuffingAttacksRecognizingandReportingPhishingCharityScamsTheCyberTwilightZoneMFAFatigueAttacksFitnessScamsTransportationScamsDeliveryScamsImposterScamsAttackSurfaces:Physicaland DigitalAttackVectors:Active andPassiveIoT andSmartDevicesCyberIncidentPrep Part1Securing YourMobile DevicefromEavesdroppingHolidayShoppingScamMarketplaceScamsDisplayNameScamsDoes YourDeviceHaveMalware?How toKeep YourBluetoothHappyBruteForceAttacksSecuring YourSmart Homeand IOTDevices FromEavesdroppingQRCodePhishingOnlineTrackingSecuring YourComputerFromEavesdroppingPasswords,Managers,and MFAUpdatingPro TipsCredentialStuffingAttacksRecognizingandReportingPhishingCharityScamsTheCyberTwilightZoneMFAFatigueAttacksFitnessScams

Cybersecurity Training Bingo Page 3 - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
I
2
B
3
N
4
B
5
I
6
I
7
I
8
O
9
O
10
N
11
O
12
G
13
B
14
O
15
G
16
N
17
B
18
B
19
N
20
I
21
I
22
B
23
G
24
O
25
G
26
G
  1. I-Transportation Scams
  2. B-Delivery Scams
  3. N-Imposter Scams
  4. B-Attack Surfaces: Physical and Digital
  5. I-Attack Vectors: Active and Passive
  6. I-IoT and Smart Devices
  7. I-Cyber Incident Prep Part 1
  8. O-Securing Your Mobile Device from Eavesdropping
  9. O-Holiday Shopping Scam
  10. N-Marketplace Scams
  11. O-Display Name Scams
  12. G-Does Your Device Have Malware?
  13. B-How to Keep Your Bluetooth Happy
  14. O-Brute Force Attacks
  15. G-Securing Your Smart Home and IOT Devices From Eavesdropping
  16. N-QR Code Phishing
  17. B-Online Tracking
  18. B-Securing Your Computer From Eavesdropping
  19. N-Passwords, Managers, and MFA
  20. I-Updating Pro Tips
  21. I- Credential Stuffing Attacks
  22. B-Recognizing and Reporting Phishing
  23. G-Charity Scams
  24. O-The Cyber Twilight Zone
  25. G-MFA Fatigue Attacks
  26. G-Fitness Scams