DarkWebGray-HatHackersCorporateEspionageBlack-HatHackersWhite-HatHackersBlackmailAttacksClosed-SourceIntelligenceHacktivistsVulnerabilityDatabasesInsiderThreatPhilosophical-Political BeliefAttacksPredictiveAnalysisThreatActorsServiceDisruptionAttacksOrganizedCrimeAttackersDisruption-ChaosAttacksISACsAPTsThreatMapsTTPsShadowITDataExfiltrationAttacksFinancialGainAttacksThreatIntelligenceThreatVectorsOSINTNation-StateAttackersZero-DayAttacksAttackSurfacesSTIXEthicalAttacksIoCsWarAttacksEspionageAttacksFree!RevengeAttacksScriptKiddieDarkWebGray-HatHackersCorporateEspionageBlack-HatHackersWhite-HatHackersBlackmailAttacksClosed-SourceIntelligenceHacktivistsVulnerabilityDatabasesInsiderThreatPhilosophical-Political BeliefAttacksPredictiveAnalysisThreatActorsServiceDisruptionAttacksOrganizedCrimeAttackersDisruption-ChaosAttacksISACsAPTsThreatMapsTTPsShadowITDataExfiltrationAttacksFinancialGainAttacksThreatIntelligenceThreatVectorsOSINTNation-StateAttackersZero-DayAttacksAttackSurfacesSTIXEthicalAttacksIoCsWarAttacksEspionageAttacksFree!RevengeAttacksScriptKiddie

CHAPTER 2 SEC+ - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
  1. Dark Web
  2. Gray-Hat Hackers
  3. Corporate Espionage
  4. Black-Hat Hackers
  5. White-Hat Hackers
  6. Blackmail Attacks
  7. Closed-Source Intelligence
  8. Hacktivists
  9. Vulnerability Databases
  10. Insider Threat
  11. Philosophical-Political Belief Attacks
  12. Predictive Analysis
  13. Threat Actors
  14. Service Disruption Attacks
  15. Organized Crime Attackers
  16. Disruption-Chaos Attacks
  17. ISACs
  18. APTs
  19. Threat Maps
  20. TTPs
  21. Shadow IT
  22. Data Exfiltration Attacks
  23. Financial Gain Attacks
  24. Threat Intelligence
  25. Threat Vectors
  26. OSINT
  27. Nation-State Attackers
  28. Zero-Day Attacks
  29. Attack Surfaces
  30. STIX
  31. Ethical Attacks
  32. IoCs
  33. War Attacks
  34. Espionage Attacks
  35. Free!
  36. Revenge Attacks
  37. Script Kiddie