WarAttacksDisruption-ChaosAttacksEthicalAttacksIoCsThreatVectorsAttackSurfacesDarkWebCorporateEspionageRevengeAttacksZero-DayAttacksThreatMapsGray-HatHackersTTPsSTIXFinancialGainAttacksBlack-HatHackersPredictiveAnalysisOSINTISACsEspionageAttacksDataExfiltrationAttacksInsiderThreatThreatActorsThreatIntelligenceShadowITScriptKiddieNation-StateAttackersServiceDisruptionAttacksWhite-HatHackersPhilosophical-Political BeliefAttacksAPTsBlackmailAttacksFree!Closed-SourceIntelligenceHacktivistsOrganizedCrimeAttackersVulnerabilityDatabasesWarAttacksDisruption-ChaosAttacksEthicalAttacksIoCsThreatVectorsAttackSurfacesDarkWebCorporateEspionageRevengeAttacksZero-DayAttacksThreatMapsGray-HatHackersTTPsSTIXFinancialGainAttacksBlack-HatHackersPredictiveAnalysisOSINTISACsEspionageAttacksDataExfiltrationAttacksInsiderThreatThreatActorsThreatIntelligenceShadowITScriptKiddieNation-StateAttackersServiceDisruptionAttacksWhite-HatHackersPhilosophical-Political BeliefAttacksAPTsBlackmailAttacksFree!Closed-SourceIntelligenceHacktivistsOrganizedCrimeAttackersVulnerabilityDatabases

CHAPTER 2 SEC+ - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
  1. War Attacks
  2. Disruption-Chaos Attacks
  3. Ethical Attacks
  4. IoCs
  5. Threat Vectors
  6. Attack Surfaces
  7. Dark Web
  8. Corporate Espionage
  9. Revenge Attacks
  10. Zero-Day Attacks
  11. Threat Maps
  12. Gray-Hat Hackers
  13. TTPs
  14. STIX
  15. Financial Gain Attacks
  16. Black-Hat Hackers
  17. Predictive Analysis
  18. OSINT
  19. ISACs
  20. Espionage Attacks
  21. Data Exfiltration Attacks
  22. Insider Threat
  23. Threat Actors
  24. Threat Intelligence
  25. Shadow IT
  26. Script Kiddie
  27. Nation-State Attackers
  28. Service Disruption Attacks
  29. White-Hat Hackers
  30. Philosophical-Political Belief Attacks
  31. APTs
  32. Blackmail Attacks
  33. Free!
  34. Closed-Source Intelligence
  35. Hacktivists
  36. Organized Crime Attackers
  37. Vulnerability Databases