ThreatActorsScriptKiddieThreatVectorsIoCsSTIXDisruption-ChaosAttacksDarkWebTTPsPredictiveAnalysisServiceDisruptionAttacksNation-StateAttackersOrganizedCrimeAttackersAPTsThreatIntelligenceAttackSurfacesHacktivistsISACsBlackmailAttacksCorporateEspionageFree!EspionageAttacksFinancialGainAttacksThreatMapsRevengeAttacksInsiderThreatBlack-HatHackersDataExfiltrationAttacksOSINTClosed-SourceIntelligenceEthicalAttacksWarAttacksShadowITVulnerabilityDatabasesPhilosophical-Political BeliefAttacksZero-DayAttacksWhite-HatHackersGray-HatHackersThreatActorsScriptKiddieThreatVectorsIoCsSTIXDisruption-ChaosAttacksDarkWebTTPsPredictiveAnalysisServiceDisruptionAttacksNation-StateAttackersOrganizedCrimeAttackersAPTsThreatIntelligenceAttackSurfacesHacktivistsISACsBlackmailAttacksCorporateEspionageFree!EspionageAttacksFinancialGainAttacksThreatMapsRevengeAttacksInsiderThreatBlack-HatHackersDataExfiltrationAttacksOSINTClosed-SourceIntelligenceEthicalAttacksWarAttacksShadowITVulnerabilityDatabasesPhilosophical-Political BeliefAttacksZero-DayAttacksWhite-HatHackersGray-HatHackers

CHAPTER 2 SEC+ - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
  1. Threat Actors
  2. Script Kiddie
  3. Threat Vectors
  4. IoCs
  5. STIX
  6. Disruption-Chaos Attacks
  7. Dark Web
  8. TTPs
  9. Predictive Analysis
  10. Service Disruption Attacks
  11. Nation-State Attackers
  12. Organized Crime Attackers
  13. APTs
  14. Threat Intelligence
  15. Attack Surfaces
  16. Hacktivists
  17. ISACs
  18. Blackmail Attacks
  19. Corporate Espionage
  20. Free!
  21. Espionage Attacks
  22. Financial Gain Attacks
  23. Threat Maps
  24. Revenge Attacks
  25. Insider Threat
  26. Black-Hat Hackers
  27. Data Exfiltration Attacks
  28. OSINT
  29. Closed-Source Intelligence
  30. Ethical Attacks
  31. War Attacks
  32. Shadow IT
  33. Vulnerability Databases
  34. Philosophical-Political Belief Attacks
  35. Zero-Day Attacks
  36. White-Hat Hackers
  37. Gray-Hat Hackers