OSINTNation-StateAttackersWhite-HatHackersAPTsServiceDisruptionAttacksGray-HatHackersThreatActorsIoCsEthicalAttacksBlack-HatHackersDataExfiltrationAttacksISACsEspionageAttacksBlackmailAttacksPredictiveAnalysisFree!InsiderThreatZero-DayAttacksRevengeAttacksClosed-SourceIntelligenceDarkWebFinancialGainAttacksAttackSurfacesOrganizedCrimeAttackersThreatIntelligenceWarAttacksTTPsVulnerabilityDatabasesCorporateEspionagePhilosophical-Political BeliefAttacksDisruption-ChaosAttacksShadowITSTIXHacktivistsThreatMapsScriptKiddieThreatVectorsOSINTNation-StateAttackersWhite-HatHackersAPTsServiceDisruptionAttacksGray-HatHackersThreatActorsIoCsEthicalAttacksBlack-HatHackersDataExfiltrationAttacksISACsEspionageAttacksBlackmailAttacksPredictiveAnalysisFree!InsiderThreatZero-DayAttacksRevengeAttacksClosed-SourceIntelligenceDarkWebFinancialGainAttacksAttackSurfacesOrganizedCrimeAttackersThreatIntelligenceWarAttacksTTPsVulnerabilityDatabasesCorporateEspionagePhilosophical-Political BeliefAttacksDisruption-ChaosAttacksShadowITSTIXHacktivistsThreatMapsScriptKiddieThreatVectors

CHAPTER 2 SEC+ - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
  1. OSINT
  2. Nation-State Attackers
  3. White-Hat Hackers
  4. APTs
  5. Service Disruption Attacks
  6. Gray-Hat Hackers
  7. Threat Actors
  8. IoCs
  9. Ethical Attacks
  10. Black-Hat Hackers
  11. Data Exfiltration Attacks
  12. ISACs
  13. Espionage Attacks
  14. Blackmail Attacks
  15. Predictive Analysis
  16. Free!
  17. Insider Threat
  18. Zero-Day Attacks
  19. Revenge Attacks
  20. Closed-Source Intelligence
  21. Dark Web
  22. Financial Gain Attacks
  23. Attack Surfaces
  24. Organized Crime Attackers
  25. Threat Intelligence
  26. War Attacks
  27. TTPs
  28. Vulnerability Databases
  29. Corporate Espionage
  30. Philosophical-Political Belief Attacks
  31. Disruption-Chaos Attacks
  32. Shadow IT
  33. STIX
  34. Hacktivists
  35. Threat Maps
  36. Script Kiddie
  37. Threat Vectors