ImposterScamsCharityScamsSecuring YourComputerFromEavesdroppingFitnessScamsCyberIncidentPrep Part1DeliveryScamsMFAFatigueAttacksAttackVectors:Active andPassiveDisplayNameScamsMarketplaceScamsTheCyberTwilightZoneBruteForceAttacksCredentialStuffingAttacksSecuring YourSmart Homeand IOTDevices FromEavesdroppingDoes YourDeviceHaveMalware?TransportationScamsPasswords,Managers,and MFAIoT andSmartDevicesQRCodePhishingUpdatingPro TipsOnlineTrackingSecuring YourMobile DevicefromEavesdroppingAttackSurfaces:Physicaland DigitalHolidayShoppingScamRecognizingandReportingPhishingHow toKeep YourBluetoothHappyImposterScamsCharityScamsSecuring YourComputerFromEavesdroppingFitnessScamsCyberIncidentPrep Part1DeliveryScamsMFAFatigueAttacksAttackVectors:Active andPassiveDisplayNameScamsMarketplaceScamsTheCyberTwilightZoneBruteForceAttacksCredentialStuffingAttacksSecuring YourSmart Homeand IOTDevices FromEavesdroppingDoes YourDeviceHaveMalware?TransportationScamsPasswords,Managers,and MFAIoT andSmartDevicesQRCodePhishingUpdatingPro TipsOnlineTrackingSecuring YourMobile DevicefromEavesdroppingAttackSurfaces:Physicaland DigitalHolidayShoppingScamRecognizingandReportingPhishingHow toKeep YourBluetoothHappy

Cybersecurity Training Bingo Page 3 - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
N
2
G
3
B
4
G
5
I
6
B
7
G
8
I
9
O
10
N
11
O
12
O
13
I
14
G
15
G
16
I
17
N
18
I
19
N
20
I
21
B
22
O
23
B
24
O
25
B
26
B
  1. N-Imposter Scams
  2. G-Charity Scams
  3. B-Securing Your Computer From Eavesdropping
  4. G-Fitness Scams
  5. I-Cyber Incident Prep Part 1
  6. B-Delivery Scams
  7. G-MFA Fatigue Attacks
  8. I-Attack Vectors: Active and Passive
  9. O-Display Name Scams
  10. N-Marketplace Scams
  11. O-The Cyber Twilight Zone
  12. O-Brute Force Attacks
  13. I- Credential Stuffing Attacks
  14. G-Securing Your Smart Home and IOT Devices From Eavesdropping
  15. G-Does Your Device Have Malware?
  16. I-Transportation Scams
  17. N-Passwords, Managers, and MFA
  18. I-IoT and Smart Devices
  19. N-QR Code Phishing
  20. I-Updating Pro Tips
  21. B-Online Tracking
  22. O-Securing Your Mobile Device from Eavesdropping
  23. B-Attack Surfaces: Physical and Digital
  24. O-Holiday Shopping Scam
  25. B-Recognizing and Reporting Phishing
  26. B-How to Keep Your Bluetooth Happy