Philosophical-Political BeliefAttacksIoCsThreatActorsOSINTWhite-HatHackersAttackSurfacesGray-HatHackersAPTsTTPsEspionageAttacksThreatVectorsThreatMapsBlackmailAttacksWarAttacksSTIXShadowITHacktivistsRevengeAttacksCorporateEspionageOrganizedCrimeAttackersThreatIntelligenceZero-DayAttacksDataExfiltrationAttacksBlack-HatHackersDarkWebISACsInsiderThreatEthicalAttacksDisruption-ChaosAttacksNation-StateAttackersFinancialGainAttacksFree!VulnerabilityDatabasesScriptKiddieClosed-SourceIntelligencePredictiveAnalysisServiceDisruptionAttacksPhilosophical-Political BeliefAttacksIoCsThreatActorsOSINTWhite-HatHackersAttackSurfacesGray-HatHackersAPTsTTPsEspionageAttacksThreatVectorsThreatMapsBlackmailAttacksWarAttacksSTIXShadowITHacktivistsRevengeAttacksCorporateEspionageOrganizedCrimeAttackersThreatIntelligenceZero-DayAttacksDataExfiltrationAttacksBlack-HatHackersDarkWebISACsInsiderThreatEthicalAttacksDisruption-ChaosAttacksNation-StateAttackersFinancialGainAttacksFree!VulnerabilityDatabasesScriptKiddieClosed-SourceIntelligencePredictiveAnalysisServiceDisruptionAttacks

CHAPTER 2 SEC+ - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
  1. Philosophical-Political Belief Attacks
  2. IoCs
  3. Threat Actors
  4. OSINT
  5. White-Hat Hackers
  6. Attack Surfaces
  7. Gray-Hat Hackers
  8. APTs
  9. TTPs
  10. Espionage Attacks
  11. Threat Vectors
  12. Threat Maps
  13. Blackmail Attacks
  14. War Attacks
  15. STIX
  16. Shadow IT
  17. Hacktivists
  18. Revenge Attacks
  19. Corporate Espionage
  20. Organized Crime Attackers
  21. Threat Intelligence
  22. Zero-Day Attacks
  23. Data Exfiltration Attacks
  24. Black-Hat Hackers
  25. Dark Web
  26. ISACs
  27. Insider Threat
  28. Ethical Attacks
  29. Disruption-Chaos Attacks
  30. Nation-State Attackers
  31. Financial Gain Attacks
  32. Free!
  33. Vulnerability Databases
  34. Script Kiddie
  35. Closed-Source Intelligence
  36. Predictive Analysis
  37. Service Disruption Attacks