RecognizingandReportingPhishingUpdatingPro TipsDisplayNameScamsTransportationScamsMFAFatigueAttacksHolidayShoppingScamBruteForceAttacksHow toKeep YourBluetoothHappyCredentialStuffingAttacksAttackVectors:Active andPassiveDoes YourDeviceHaveMalware?OnlineTrackingCharityScamsFitnessScamsSecuring YourMobile DevicefromEavesdroppingMarketplaceScamsIoT andSmartDevicesAttackSurfaces:Physicaland DigitalTheCyberTwilightZoneQRCodePhishingSecuring YourSmart Homeand IOTDevices FromEavesdroppingPasswords,Managers,and MFADeliveryScamsSecuring YourComputerFromEavesdroppingCyberIncidentPrep Part1ImposterScamsRecognizingandReportingPhishingUpdatingPro TipsDisplayNameScamsTransportationScamsMFAFatigueAttacksHolidayShoppingScamBruteForceAttacksHow toKeep YourBluetoothHappyCredentialStuffingAttacksAttackVectors:Active andPassiveDoes YourDeviceHaveMalware?OnlineTrackingCharityScamsFitnessScamsSecuring YourMobile DevicefromEavesdroppingMarketplaceScamsIoT andSmartDevicesAttackSurfaces:Physicaland DigitalTheCyberTwilightZoneQRCodePhishingSecuring YourSmart Homeand IOTDevices FromEavesdroppingPasswords,Managers,and MFADeliveryScamsSecuring YourComputerFromEavesdroppingCyberIncidentPrep Part1ImposterScams

Cybersecurity Training Bingo Page 3 - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
B
2
I
3
O
4
I
5
G
6
O
7
O
8
B
9
I
10
I
11
G
12
B
13
G
14
G
15
O
16
N
17
I
18
B
19
O
20
N
21
G
22
N
23
B
24
B
25
I
26
N
  1. B-Recognizing and Reporting Phishing
  2. I-Updating Pro Tips
  3. O-Display Name Scams
  4. I-Transportation Scams
  5. G-MFA Fatigue Attacks
  6. O-Holiday Shopping Scam
  7. O-Brute Force Attacks
  8. B-How to Keep Your Bluetooth Happy
  9. I- Credential Stuffing Attacks
  10. I-Attack Vectors: Active and Passive
  11. G-Does Your Device Have Malware?
  12. B-Online Tracking
  13. G-Charity Scams
  14. G-Fitness Scams
  15. O-Securing Your Mobile Device from Eavesdropping
  16. N-Marketplace Scams
  17. I-IoT and Smart Devices
  18. B-Attack Surfaces: Physical and Digital
  19. O-The Cyber Twilight Zone
  20. N-QR Code Phishing
  21. G-Securing Your Smart Home and IOT Devices From Eavesdropping
  22. N-Passwords, Managers, and MFA
  23. B-Delivery Scams
  24. B-Securing Your Computer From Eavesdropping
  25. I-Cyber Incident Prep Part 1
  26. N-Imposter Scams