QRCodePhishingDoes YourDeviceHaveMalware?AttackVectors:Active andPassiveDisplayNameScamsOnlineTrackingCyberIncidentPrep Part1ImposterScamsCredentialStuffingAttacksMFAFatigueAttacksCharityScamsDeliveryScamsIoT andSmartDevicesPasswords,Managers,and MFABruteForceAttacksFitnessScamsTheCyberTwilightZoneSecuring YourSmart Homeand IOTDevices FromEavesdroppingMarketplaceScamsUpdatingPro TipsSecuring YourComputerFromEavesdroppingSecuring YourMobile DevicefromEavesdroppingRecognizingandReportingPhishingAttackSurfaces:Physicaland DigitalHolidayShoppingScamTransportationScamsHow toKeep YourBluetoothHappyQRCodePhishingDoes YourDeviceHaveMalware?AttackVectors:Active andPassiveDisplayNameScamsOnlineTrackingCyberIncidentPrep Part1ImposterScamsCredentialStuffingAttacksMFAFatigueAttacksCharityScamsDeliveryScamsIoT andSmartDevicesPasswords,Managers,and MFABruteForceAttacksFitnessScamsTheCyberTwilightZoneSecuring YourSmart Homeand IOTDevices FromEavesdroppingMarketplaceScamsUpdatingPro TipsSecuring YourComputerFromEavesdroppingSecuring YourMobile DevicefromEavesdroppingRecognizingandReportingPhishingAttackSurfaces:Physicaland DigitalHolidayShoppingScamTransportationScamsHow toKeep YourBluetoothHappy

Cybersecurity Training Bingo Page 3 - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
N
2
G
3
I
4
O
5
B
6
I
7
N
8
I
9
G
10
G
11
B
12
I
13
N
14
O
15
G
16
O
17
G
18
N
19
I
20
B
21
O
22
B
23
B
24
O
25
I
26
B
  1. N-QR Code Phishing
  2. G-Does Your Device Have Malware?
  3. I-Attack Vectors: Active and Passive
  4. O-Display Name Scams
  5. B-Online Tracking
  6. I-Cyber Incident Prep Part 1
  7. N-Imposter Scams
  8. I- Credential Stuffing Attacks
  9. G-MFA Fatigue Attacks
  10. G-Charity Scams
  11. B-Delivery Scams
  12. I-IoT and Smart Devices
  13. N-Passwords, Managers, and MFA
  14. O-Brute Force Attacks
  15. G-Fitness Scams
  16. O-The Cyber Twilight Zone
  17. G-Securing Your Smart Home and IOT Devices From Eavesdropping
  18. N-Marketplace Scams
  19. I-Updating Pro Tips
  20. B-Securing Your Computer From Eavesdropping
  21. O-Securing Your Mobile Device from Eavesdropping
  22. B-Recognizing and Reporting Phishing
  23. B-Attack Surfaces: Physical and Digital
  24. O-Holiday Shopping Scam
  25. I-Transportation Scams
  26. B-How to Keep Your Bluetooth Happy