Session Hijacking IoT Penetration Test Security Policy Keylogger Patch Clickjacking Encryption Blacklisting Botnet Blue Team Dark Web VPN Privilege Escalation Whitelisting Man- in-the- Middle Credential Stuffing SSL Malware Digital Forensics Insider Threat Multi-Factor Authentication Exploit Private Key Incident Response Zero- Day BYOD TLC Cross- Site Scripting Public Key Cyber Hygiene Brute Force Rootkit Shoulder Surfing Security Audit Zero Trust Backdoor Access Control Data Breach MITM 2FA Trojan Ransomware CISO Threat Intelligence Antivirus Patch Management Red Team Sandbox Password Phishing Security Token Risk Assessment SIEM Cyberattack DDoS Security Awareness Social Engineering SQL Injection Social Media Risk Yellow Team Spyware Firewall Air Gap Session Hijacking IoT Penetration Test Security Policy Keylogger Patch Clickjacking Encryption Blacklisting Botnet Blue Team Dark Web VPN Privilege Escalation Whitelisting Man- in-the- Middle Credential Stuffing SSL Malware Digital Forensics Insider Threat Multi-Factor Authentication Exploit Private Key Incident Response Zero- Day BYOD TLC Cross- Site Scripting Public Key Cyber Hygiene Brute Force Rootkit Shoulder Surfing Security Audit Zero Trust Backdoor Access Control Data Breach MITM 2FA Trojan Ransomware CISO Threat Intelligence Antivirus Patch Management Red Team Sandbox Password Phishing Security Token Risk Assessment SIEM Cyberattack DDoS Security Awareness Social Engineering SQL Injection Social Media Risk Yellow Team Spyware Firewall Air Gap
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Session Hijacking
IoT
Penetration Test
Security Policy
Keylogger
Patch
Clickjacking
Encryption
Blacklisting
Botnet
Blue Team
Dark Web
VPN
Privilege Escalation
Whitelisting
Man-in-the-Middle
Credential Stuffing
SSL
Malware
Digital Forensics
Insider Threat
Multi-Factor Authentication
Exploit
Private Key
Incident Response
Zero-Day
BYOD
TLC
Cross-Site Scripting
Public Key
Cyber Hygiene
Brute Force
Rootkit
Shoulder Surfing
Security Audit
Zero Trust
Backdoor
Access Control
Data Breach
MITM
2FA
Trojan
Ransomware
CISO
Threat Intelligence
Antivirus
Patch Management
Red Team
Sandbox
Password
Phishing
Security Token
Risk Assessment
SIEM
Cyberattack
DDoS
Security Awareness
Social Engineering
SQL Injection
Social Media Risk
Yellow Team
Spyware
Firewall
Air Gap