IoCsRevengeAttacksThreatActorsVulnerabilityDatabasesOSINTFree!White-HatHackersISACsEthicalAttacksBlackmailAttacksBlack-HatHackersZero-DayAttacksThreatMapsAPTsPhilosophical-Political BeliefAttacksOrganizedCrimeAttackersWarAttacksPredictiveAnalysisThreatVectorsHacktivistsScriptKiddieAttackSurfacesGray-HatHackersInsiderThreatCorporateEspionageFinancialGainAttacksNation-StateAttackersDisruption-ChaosAttacksClosed-SourceIntelligenceThreatIntelligenceTTPsSTIXDataExfiltrationAttacksEspionageAttacksServiceDisruptionAttacksShadowITDarkWebIoCsRevengeAttacksThreatActorsVulnerabilityDatabasesOSINTFree!White-HatHackersISACsEthicalAttacksBlackmailAttacksBlack-HatHackersZero-DayAttacksThreatMapsAPTsPhilosophical-Political BeliefAttacksOrganizedCrimeAttackersWarAttacksPredictiveAnalysisThreatVectorsHacktivistsScriptKiddieAttackSurfacesGray-HatHackersInsiderThreatCorporateEspionageFinancialGainAttacksNation-StateAttackersDisruption-ChaosAttacksClosed-SourceIntelligenceThreatIntelligenceTTPsSTIXDataExfiltrationAttacksEspionageAttacksServiceDisruptionAttacksShadowITDarkWeb

CHAPTER 2 SEC+ - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
  1. IoCs
  2. Revenge Attacks
  3. Threat Actors
  4. Vulnerability Databases
  5. OSINT
  6. Free!
  7. White-Hat Hackers
  8. ISACs
  9. Ethical Attacks
  10. Blackmail Attacks
  11. Black-Hat Hackers
  12. Zero-Day Attacks
  13. Threat Maps
  14. APTs
  15. Philosophical-Political Belief Attacks
  16. Organized Crime Attackers
  17. War Attacks
  18. Predictive Analysis
  19. Threat Vectors
  20. Hacktivists
  21. Script Kiddie
  22. Attack Surfaces
  23. Gray-Hat Hackers
  24. Insider Threat
  25. Corporate Espionage
  26. Financial Gain Attacks
  27. Nation-State Attackers
  28. Disruption-Chaos Attacks
  29. Closed-Source Intelligence
  30. Threat Intelligence
  31. TTPs
  32. STIX
  33. Data Exfiltration Attacks
  34. Espionage Attacks
  35. Service Disruption Attacks
  36. Shadow IT
  37. Dark Web