Closed-SourceIntelligenceZero-DayAttacksFree!AttackSurfacesAPTsTTPsThreatMapsOSINTIoCsSTIXRevengeAttacksPhilosophical-Political BeliefAttacksWhite-HatHackersWarAttacksEspionageAttacksHacktivistsPredictiveAnalysisThreatVectorsEthicalAttacksServiceDisruptionAttacksFinancialGainAttacksDisruption-ChaosAttacksDarkWebISACsInsiderThreatNation-StateAttackersBlack-HatHackersGray-HatHackersOrganizedCrimeAttackersScriptKiddieCorporateEspionageThreatActorsThreatIntelligenceDataExfiltrationAttacksShadowITVulnerabilityDatabasesBlackmailAttacksClosed-SourceIntelligenceZero-DayAttacksFree!AttackSurfacesAPTsTTPsThreatMapsOSINTIoCsSTIXRevengeAttacksPhilosophical-Political BeliefAttacksWhite-HatHackersWarAttacksEspionageAttacksHacktivistsPredictiveAnalysisThreatVectorsEthicalAttacksServiceDisruptionAttacksFinancialGainAttacksDisruption-ChaosAttacksDarkWebISACsInsiderThreatNation-StateAttackersBlack-HatHackersGray-HatHackersOrganizedCrimeAttackersScriptKiddieCorporateEspionageThreatActorsThreatIntelligenceDataExfiltrationAttacksShadowITVulnerabilityDatabasesBlackmailAttacks

CHAPTER 2 SEC+ - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
  1. Closed-Source Intelligence
  2. Zero-Day Attacks
  3. Free!
  4. Attack Surfaces
  5. APTs
  6. TTPs
  7. Threat Maps
  8. OSINT
  9. IoCs
  10. STIX
  11. Revenge Attacks
  12. Philosophical-Political Belief Attacks
  13. White-Hat Hackers
  14. War Attacks
  15. Espionage Attacks
  16. Hacktivists
  17. Predictive Analysis
  18. Threat Vectors
  19. Ethical Attacks
  20. Service Disruption Attacks
  21. Financial Gain Attacks
  22. Disruption-Chaos Attacks
  23. Dark Web
  24. ISACs
  25. Insider Threat
  26. Nation-State Attackers
  27. Black-Hat Hackers
  28. Gray-Hat Hackers
  29. Organized Crime Attackers
  30. Script Kiddie
  31. Corporate Espionage
  32. Threat Actors
  33. Threat Intelligence
  34. Data Exfiltration Attacks
  35. Shadow IT
  36. Vulnerability Databases
  37. Blackmail Attacks