Free!ISACsBlack-HatHackersOrganizedCrimeAttackersHacktivistsOSINTWarAttacksFinancialGainAttacksThreatIntelligenceEthicalAttacksInsiderThreatDarkWebThreatVectorsAttackSurfacesDataExfiltrationAttacksIoCsPhilosophical-Political BeliefAttacksCorporateEspionageZero-DayAttacksTTPsShadowITEspionageAttacksServiceDisruptionAttacksWhite-HatHackersAPTsNation-StateAttackersVulnerabilityDatabasesClosed-SourceIntelligenceThreatMapsPredictiveAnalysisRevengeAttacksBlackmailAttacksScriptKiddieSTIXGray-HatHackersThreatActorsDisruption-ChaosAttacksFree!ISACsBlack-HatHackersOrganizedCrimeAttackersHacktivistsOSINTWarAttacksFinancialGainAttacksThreatIntelligenceEthicalAttacksInsiderThreatDarkWebThreatVectorsAttackSurfacesDataExfiltrationAttacksIoCsPhilosophical-Political BeliefAttacksCorporateEspionageZero-DayAttacksTTPsShadowITEspionageAttacksServiceDisruptionAttacksWhite-HatHackersAPTsNation-StateAttackersVulnerabilityDatabasesClosed-SourceIntelligenceThreatMapsPredictiveAnalysisRevengeAttacksBlackmailAttacksScriptKiddieSTIXGray-HatHackersThreatActorsDisruption-ChaosAttacks

CHAPTER 2 SEC+ - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
  1. Free!
  2. ISACs
  3. Black-Hat Hackers
  4. Organized Crime Attackers
  5. Hacktivists
  6. OSINT
  7. War Attacks
  8. Financial Gain Attacks
  9. Threat Intelligence
  10. Ethical Attacks
  11. Insider Threat
  12. Dark Web
  13. Threat Vectors
  14. Attack Surfaces
  15. Data Exfiltration Attacks
  16. IoCs
  17. Philosophical-Political Belief Attacks
  18. Corporate Espionage
  19. Zero-Day Attacks
  20. TTPs
  21. Shadow IT
  22. Espionage Attacks
  23. Service Disruption Attacks
  24. White-Hat Hackers
  25. APTs
  26. Nation-State Attackers
  27. Vulnerability Databases
  28. Closed-Source Intelligence
  29. Threat Maps
  30. Predictive Analysis
  31. Revenge Attacks
  32. Blackmail Attacks
  33. Script Kiddie
  34. STIX
  35. Gray-Hat Hackers
  36. Threat Actors
  37. Disruption-Chaos Attacks