DarkWebISACsCorporateEspionageAttackSurfacesThreatVectorsClosed-SourceIntelligenceHacktivistsZero-DayAttacksShadowITIoCsVulnerabilityDatabasesServiceDisruptionAttacksSTIXFinancialGainAttacksBlack-HatHackersNation-StateAttackersThreatMapsTTPsWarAttacksInsiderThreatOSINTThreatActorsOrganizedCrimeAttackersEspionageAttacksAPTsScriptKiddieDisruption-ChaosAttacksGray-HatHackersEthicalAttacksPredictiveAnalysisBlackmailAttacksPhilosophical-Political BeliefAttacksThreatIntelligenceFree!DataExfiltrationAttacksWhite-HatHackersRevengeAttacksDarkWebISACsCorporateEspionageAttackSurfacesThreatVectorsClosed-SourceIntelligenceHacktivistsZero-DayAttacksShadowITIoCsVulnerabilityDatabasesServiceDisruptionAttacksSTIXFinancialGainAttacksBlack-HatHackersNation-StateAttackersThreatMapsTTPsWarAttacksInsiderThreatOSINTThreatActorsOrganizedCrimeAttackersEspionageAttacksAPTsScriptKiddieDisruption-ChaosAttacksGray-HatHackersEthicalAttacksPredictiveAnalysisBlackmailAttacksPhilosophical-Political BeliefAttacksThreatIntelligenceFree!DataExfiltrationAttacksWhite-HatHackersRevengeAttacks

CHAPTER 2 SEC+ - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
  1. Dark Web
  2. ISACs
  3. Corporate Espionage
  4. Attack Surfaces
  5. Threat Vectors
  6. Closed-Source Intelligence
  7. Hacktivists
  8. Zero-Day Attacks
  9. Shadow IT
  10. IoCs
  11. Vulnerability Databases
  12. Service Disruption Attacks
  13. STIX
  14. Financial Gain Attacks
  15. Black-Hat Hackers
  16. Nation-State Attackers
  17. Threat Maps
  18. TTPs
  19. War Attacks
  20. Insider Threat
  21. OSINT
  22. Threat Actors
  23. Organized Crime Attackers
  24. Espionage Attacks
  25. APTs
  26. Script Kiddie
  27. Disruption-Chaos Attacks
  28. Gray-Hat Hackers
  29. Ethical Attacks
  30. Predictive Analysis
  31. Blackmail Attacks
  32. Philosophical-Political Belief Attacks
  33. Threat Intelligence
  34. Free!
  35. Data Exfiltration Attacks
  36. White-Hat Hackers
  37. Revenge Attacks