EthicalAttacksClosed-SourceIntelligenceShadowITEspionageAttacksOrganizedCrimeAttackersDataExfiltrationAttacksDisruption-ChaosAttacksBlackmailAttacksSTIXScriptKiddieOSINTAPTsPhilosophical-Political BeliefAttacksFree!PredictiveAnalysisBlack-HatHackersIoCsInsiderThreatThreatVectorsThreatActorsGray-HatHackersThreatIntelligenceAttackSurfacesWarAttacksFinancialGainAttacksZero-DayAttacksServiceDisruptionAttacksHacktivistsNation-StateAttackersThreatMapsCorporateEspionageWhite-HatHackersVulnerabilityDatabasesISACsTTPsRevengeAttacksDarkWebEthicalAttacksClosed-SourceIntelligenceShadowITEspionageAttacksOrganizedCrimeAttackersDataExfiltrationAttacksDisruption-ChaosAttacksBlackmailAttacksSTIXScriptKiddieOSINTAPTsPhilosophical-Political BeliefAttacksFree!PredictiveAnalysisBlack-HatHackersIoCsInsiderThreatThreatVectorsThreatActorsGray-HatHackersThreatIntelligenceAttackSurfacesWarAttacksFinancialGainAttacksZero-DayAttacksServiceDisruptionAttacksHacktivistsNation-StateAttackersThreatMapsCorporateEspionageWhite-HatHackersVulnerabilityDatabasesISACsTTPsRevengeAttacksDarkWeb

CHAPTER 2 SEC+ - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
  1. Ethical Attacks
  2. Closed-Source Intelligence
  3. Shadow IT
  4. Espionage Attacks
  5. Organized Crime Attackers
  6. Data Exfiltration Attacks
  7. Disruption-Chaos Attacks
  8. Blackmail Attacks
  9. STIX
  10. Script Kiddie
  11. OSINT
  12. APTs
  13. Philosophical-Political Belief Attacks
  14. Free!
  15. Predictive Analysis
  16. Black-Hat Hackers
  17. IoCs
  18. Insider Threat
  19. Threat Vectors
  20. Threat Actors
  21. Gray-Hat Hackers
  22. Threat Intelligence
  23. Attack Surfaces
  24. War Attacks
  25. Financial Gain Attacks
  26. Zero-Day Attacks
  27. Service Disruption Attacks
  28. Hacktivists
  29. Nation-State Attackers
  30. Threat Maps
  31. Corporate Espionage
  32. White-Hat Hackers
  33. Vulnerability Databases
  34. ISACs
  35. TTPs
  36. Revenge Attacks
  37. Dark Web