WarAttacksGray-HatHackersHacktivistsPredictiveAnalysisBlackmailAttacksOSINTRevengeAttacksShadowITTTPsThreatActorsFree!ISACsServiceDisruptionAttacksFinancialGainAttacksEspionageAttacksIoCsThreatIntelligenceEthicalAttacksDisruption-ChaosAttacksWhite-HatHackersCorporateEspionageZero-DayAttacksThreatMapsSTIXDarkWebAPTsDataExfiltrationAttacksInsiderThreatScriptKiddieNation-StateAttackersClosed-SourceIntelligenceVulnerabilityDatabasesBlack-HatHackersPhilosophical-Political BeliefAttacksOrganizedCrimeAttackersAttackSurfacesThreatVectorsWarAttacksGray-HatHackersHacktivistsPredictiveAnalysisBlackmailAttacksOSINTRevengeAttacksShadowITTTPsThreatActorsFree!ISACsServiceDisruptionAttacksFinancialGainAttacksEspionageAttacksIoCsThreatIntelligenceEthicalAttacksDisruption-ChaosAttacksWhite-HatHackersCorporateEspionageZero-DayAttacksThreatMapsSTIXDarkWebAPTsDataExfiltrationAttacksInsiderThreatScriptKiddieNation-StateAttackersClosed-SourceIntelligenceVulnerabilityDatabasesBlack-HatHackersPhilosophical-Political BeliefAttacksOrganizedCrimeAttackersAttackSurfacesThreatVectors

CHAPTER 2 SEC+ - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
  1. War Attacks
  2. Gray-Hat Hackers
  3. Hacktivists
  4. Predictive Analysis
  5. Blackmail Attacks
  6. OSINT
  7. Revenge Attacks
  8. Shadow IT
  9. TTPs
  10. Threat Actors
  11. Free!
  12. ISACs
  13. Service Disruption Attacks
  14. Financial Gain Attacks
  15. Espionage Attacks
  16. IoCs
  17. Threat Intelligence
  18. Ethical Attacks
  19. Disruption-Chaos Attacks
  20. White-Hat Hackers
  21. Corporate Espionage
  22. Zero-Day Attacks
  23. Threat Maps
  24. STIX
  25. Dark Web
  26. APTs
  27. Data Exfiltration Attacks
  28. Insider Threat
  29. Script Kiddie
  30. Nation-State Attackers
  31. Closed-Source Intelligence
  32. Vulnerability Databases
  33. Black-Hat Hackers
  34. Philosophical-Political Belief Attacks
  35. Organized Crime Attackers
  36. Attack Surfaces
  37. Threat Vectors