CorporateEspionageScriptKiddieRevengeAttacksVulnerabilityDatabasesThreatActorsServiceDisruptionAttacksAPTsOrganizedCrimeAttackersBlackmailAttacksNation-StateAttackersWarAttacksPredictiveAnalysisThreatIntelligenceBlack-HatHackersWhite-HatHackersShadowITDisruption-ChaosAttacksOSINTTTPsThreatMapsThreatVectorsISACsFree!FinancialGainAttacksSTIXDataExfiltrationAttacksGray-HatHackersEspionageAttacksInsiderThreatDarkWebEthicalAttacksPhilosophical-Political BeliefAttacksIoCsAttackSurfacesHacktivistsZero-DayAttacksClosed-SourceIntelligenceCorporateEspionageScriptKiddieRevengeAttacksVulnerabilityDatabasesThreatActorsServiceDisruptionAttacksAPTsOrganizedCrimeAttackersBlackmailAttacksNation-StateAttackersWarAttacksPredictiveAnalysisThreatIntelligenceBlack-HatHackersWhite-HatHackersShadowITDisruption-ChaosAttacksOSINTTTPsThreatMapsThreatVectorsISACsFree!FinancialGainAttacksSTIXDataExfiltrationAttacksGray-HatHackersEspionageAttacksInsiderThreatDarkWebEthicalAttacksPhilosophical-Political BeliefAttacksIoCsAttackSurfacesHacktivistsZero-DayAttacksClosed-SourceIntelligence

CHAPTER 2 SEC+ - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
  1. Corporate Espionage
  2. Script Kiddie
  3. Revenge Attacks
  4. Vulnerability Databases
  5. Threat Actors
  6. Service Disruption Attacks
  7. APTs
  8. Organized Crime Attackers
  9. Blackmail Attacks
  10. Nation-State Attackers
  11. War Attacks
  12. Predictive Analysis
  13. Threat Intelligence
  14. Black-Hat Hackers
  15. White-Hat Hackers
  16. Shadow IT
  17. Disruption-Chaos Attacks
  18. OSINT
  19. TTPs
  20. Threat Maps
  21. Threat Vectors
  22. ISACs
  23. Free!
  24. Financial Gain Attacks
  25. STIX
  26. Data Exfiltration Attacks
  27. Gray-Hat Hackers
  28. Espionage Attacks
  29. Insider Threat
  30. Dark Web
  31. Ethical Attacks
  32. Philosophical-Political Belief Attacks
  33. IoCs
  34. Attack Surfaces
  35. Hacktivists
  36. Zero-Day Attacks
  37. Closed-Source Intelligence