CharityScamsCredentialStuffingAttacksHolidayShoppingScamRecognizingandReportingPhishingSecuring YourMobile DevicefromEavesdroppingCyberIncidentPrep Part1Securing YourSmart Homeand IOTDevices FromEavesdroppingPasswords,Managers,and MFADisplayNameScamsQRCodePhishingImposterScamsAttackVectors:Active andPassiveIoT andSmartDevicesMarketplaceScamsTheCyberTwilightZoneHow toKeep YourBluetoothHappySecuring YourComputerFromEavesdroppingFitnessScamsOnlineTrackingDoes YourDeviceHaveMalware?DeliveryScamsBruteForceAttacksAttackSurfaces:Physicaland DigitalTransportationScamsMFAFatigueAttacksUpdatingPro TipsCharityScamsCredentialStuffingAttacksHolidayShoppingScamRecognizingandReportingPhishingSecuring YourMobile DevicefromEavesdroppingCyberIncidentPrep Part1Securing YourSmart Homeand IOTDevices FromEavesdroppingPasswords,Managers,and MFADisplayNameScamsQRCodePhishingImposterScamsAttackVectors:Active andPassiveIoT andSmartDevicesMarketplaceScamsTheCyberTwilightZoneHow toKeep YourBluetoothHappySecuring YourComputerFromEavesdroppingFitnessScamsOnlineTrackingDoes YourDeviceHaveMalware?DeliveryScamsBruteForceAttacksAttackSurfaces:Physicaland DigitalTransportationScamsMFAFatigueAttacksUpdatingPro Tips

Cybersecurity Training Bingo Page 3 - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
G
2
I
3
O
4
B
5
O
6
I
7
G
8
N
9
O
10
N
11
N
12
I
13
I
14
N
15
O
16
B
17
B
18
G
19
B
20
G
21
B
22
O
23
B
24
I
25
G
26
I
  1. G-Charity Scams
  2. I- Credential Stuffing Attacks
  3. O-Holiday Shopping Scam
  4. B-Recognizing and Reporting Phishing
  5. O-Securing Your Mobile Device from Eavesdropping
  6. I-Cyber Incident Prep Part 1
  7. G-Securing Your Smart Home and IOT Devices From Eavesdropping
  8. N-Passwords, Managers, and MFA
  9. O-Display Name Scams
  10. N-QR Code Phishing
  11. N-Imposter Scams
  12. I-Attack Vectors: Active and Passive
  13. I-IoT and Smart Devices
  14. N-Marketplace Scams
  15. O-The Cyber Twilight Zone
  16. B-How to Keep Your Bluetooth Happy
  17. B-Securing Your Computer From Eavesdropping
  18. G-Fitness Scams
  19. B-Online Tracking
  20. G-Does Your Device Have Malware?
  21. B-Delivery Scams
  22. O-Brute Force Attacks
  23. B-Attack Surfaces: Physical and Digital
  24. I-Transportation Scams
  25. G-MFA Fatigue Attacks
  26. I-Updating Pro Tips