Exploit Penetration Test Credential Stuffing Red Team Spyware Shoulder Surfing Access Control Whitelisting Social Engineering CISO Cross- Site Scripting DDoS Data Breach Firewall BYOD Blue Team Social Media Risk Dark Web Encryption TLC 2FA Digital Forensics Zero- Day Patch Management Air Gap Phishing Antivirus Risk Assessment Sandbox Brute Force Security Audit Multi-Factor Authentication Clickjacking Ransomware Trojan Cyberattack Private Key Session Hijacking SQL Injection Blacklisting SIEM SSL Insider Threat VPN Public Key MITM Threat Intelligence Rootkit Yellow Team Security Token Botnet Incident Response Malware Security Awareness Cyber Hygiene Patch Security Policy Backdoor Password Privilege Escalation IoT Man- in-the- Middle Zero Trust Keylogger Exploit Penetration Test Credential Stuffing Red Team Spyware Shoulder Surfing Access Control Whitelisting Social Engineering CISO Cross- Site Scripting DDoS Data Breach Firewall BYOD Blue Team Social Media Risk Dark Web Encryption TLC 2FA Digital Forensics Zero- Day Patch Management Air Gap Phishing Antivirus Risk Assessment Sandbox Brute Force Security Audit Multi-Factor Authentication Clickjacking Ransomware Trojan Cyberattack Private Key Session Hijacking SQL Injection Blacklisting SIEM SSL Insider Threat VPN Public Key MITM Threat Intelligence Rootkit Yellow Team Security Token Botnet Incident Response Malware Security Awareness Cyber Hygiene Patch Security Policy Backdoor Password Privilege Escalation IoT Man- in-the- Middle Zero Trust Keylogger
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Exploit
Penetration Test
Credential Stuffing
Red Team
Spyware
Shoulder Surfing
Access Control
Whitelisting
Social Engineering
CISO
Cross-Site Scripting
DDoS
Data Breach
Firewall
BYOD
Blue Team
Social Media Risk
Dark Web
Encryption
TLC
2FA
Digital Forensics
Zero-Day
Patch Management
Air Gap
Phishing
Antivirus
Risk Assessment
Sandbox
Brute Force
Security Audit
Multi-Factor Authentication
Clickjacking
Ransomware
Trojan
Cyberattack
Private Key
Session Hijacking
SQL Injection
Blacklisting
SIEM
SSL
Insider Threat
VPN
Public Key
MITM
Threat Intelligence
Rootkit
Yellow Team
Security Token
Botnet
Incident Response
Malware
Security Awareness
Cyber Hygiene
Patch
Security Policy
Backdoor
Password
Privilege Escalation
IoT
Man-in-the-Middle
Zero Trust
Keylogger