Does YourDeviceHaveMalware?How toKeep YourBluetoothHappyTransportationScamsBruteForceAttacksImposterScamsPasswords,Managers,and MFACharityScamsSecuring YourMobile DevicefromEavesdroppingRecognizingandReportingPhishingOnlineTrackingTheCyberTwilightZoneFitnessScamsIoT andSmartDevicesHolidayShoppingScamCredentialStuffingAttacksAttackSurfaces:Physicaland DigitalAttackVectors:Active andPassiveMFAFatigueAttacksMarketplaceScamsSecuring YourComputerFromEavesdroppingSecuring YourSmart Homeand IOTDevices FromEavesdroppingDeliveryScamsQRCodePhishingCyberIncidentPrep Part1DisplayNameScamsUpdatingPro TipsDoes YourDeviceHaveMalware?How toKeep YourBluetoothHappyTransportationScamsBruteForceAttacksImposterScamsPasswords,Managers,and MFACharityScamsSecuring YourMobile DevicefromEavesdroppingRecognizingandReportingPhishingOnlineTrackingTheCyberTwilightZoneFitnessScamsIoT andSmartDevicesHolidayShoppingScamCredentialStuffingAttacksAttackSurfaces:Physicaland DigitalAttackVectors:Active andPassiveMFAFatigueAttacksMarketplaceScamsSecuring YourComputerFromEavesdroppingSecuring YourSmart Homeand IOTDevices FromEavesdroppingDeliveryScamsQRCodePhishingCyberIncidentPrep Part1DisplayNameScamsUpdatingPro Tips

Cybersecurity Training Bingo Page 3 - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
G
2
B
3
I
4
O
5
N
6
N
7
G
8
O
9
B
10
B
11
O
12
G
13
I
14
O
15
I
16
B
17
I
18
G
19
N
20
B
21
G
22
B
23
N
24
I
25
O
26
I
  1. G-Does Your Device Have Malware?
  2. B-How to Keep Your Bluetooth Happy
  3. I-Transportation Scams
  4. O-Brute Force Attacks
  5. N-Imposter Scams
  6. N-Passwords, Managers, and MFA
  7. G-Charity Scams
  8. O-Securing Your Mobile Device from Eavesdropping
  9. B-Recognizing and Reporting Phishing
  10. B-Online Tracking
  11. O-The Cyber Twilight Zone
  12. G-Fitness Scams
  13. I-IoT and Smart Devices
  14. O-Holiday Shopping Scam
  15. I- Credential Stuffing Attacks
  16. B-Attack Surfaces: Physical and Digital
  17. I-Attack Vectors: Active and Passive
  18. G-MFA Fatigue Attacks
  19. N-Marketplace Scams
  20. B-Securing Your Computer From Eavesdropping
  21. G-Securing Your Smart Home and IOT Devices From Eavesdropping
  22. B-Delivery Scams
  23. N-QR Code Phishing
  24. I-Cyber Incident Prep Part 1
  25. O-Display Name Scams
  26. I-Updating Pro Tips