OnlineTrackingRecognizingandReportingPhishingBruteForceAttacksSecuring YourMobile DevicefromEavesdroppingSecuring YourComputerFromEavesdroppingUpdatingPro TipsHow toKeep YourBluetoothHappyIoT andSmartDevicesFitnessScamsTransportationScamsSecuring YourSmart Homeand IOTDevices FromEavesdroppingHolidayShoppingScamCredentialStuffingAttacksCyberIncidentPrep Part1TheCyberTwilightZoneImposterScamsMarketplaceScamsQRCodePhishingPasswords,Managers,and MFAMFAFatigueAttacksDisplayNameScamsAttackSurfaces:Physicaland DigitalAttackVectors:Active andPassiveCharityScamsDeliveryScamsDoes YourDeviceHaveMalware?OnlineTrackingRecognizingandReportingPhishingBruteForceAttacksSecuring YourMobile DevicefromEavesdroppingSecuring YourComputerFromEavesdroppingUpdatingPro TipsHow toKeep YourBluetoothHappyIoT andSmartDevicesFitnessScamsTransportationScamsSecuring YourSmart Homeand IOTDevices FromEavesdroppingHolidayShoppingScamCredentialStuffingAttacksCyberIncidentPrep Part1TheCyberTwilightZoneImposterScamsMarketplaceScamsQRCodePhishingPasswords,Managers,and MFAMFAFatigueAttacksDisplayNameScamsAttackSurfaces:Physicaland DigitalAttackVectors:Active andPassiveCharityScamsDeliveryScamsDoes YourDeviceHaveMalware?

Cybersecurity Training Bingo Page 3 - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
B
2
B
3
O
4
O
5
B
6
I
7
B
8
I
9
G
10
I
11
G
12
O
13
I
14
I
15
O
16
N
17
N
18
N
19
N
20
G
21
O
22
B
23
I
24
G
25
B
26
G
  1. B-Online Tracking
  2. B-Recognizing and Reporting Phishing
  3. O-Brute Force Attacks
  4. O-Securing Your Mobile Device from Eavesdropping
  5. B-Securing Your Computer From Eavesdropping
  6. I-Updating Pro Tips
  7. B-How to Keep Your Bluetooth Happy
  8. I-IoT and Smart Devices
  9. G-Fitness Scams
  10. I-Transportation Scams
  11. G-Securing Your Smart Home and IOT Devices From Eavesdropping
  12. O-Holiday Shopping Scam
  13. I- Credential Stuffing Attacks
  14. I-Cyber Incident Prep Part 1
  15. O-The Cyber Twilight Zone
  16. N-Imposter Scams
  17. N-Marketplace Scams
  18. N-QR Code Phishing
  19. N-Passwords, Managers, and MFA
  20. G-MFA Fatigue Attacks
  21. O-Display Name Scams
  22. B-Attack Surfaces: Physical and Digital
  23. I-Attack Vectors: Active and Passive
  24. G-Charity Scams
  25. B-Delivery Scams
  26. G-Does Your Device Have Malware?