STIXShadowITOSINTFinancialGainAttacksThreatIntelligenceThreatActorsDataExfiltrationAttacksBlackmailAttacksVulnerabilityDatabasesGray-HatHackersScriptKiddieHacktivistsFree!Disruption-ChaosAttacksWarAttacksInsiderThreatBlack-HatHackersPhilosophical-Political BeliefAttacksAttackSurfacesPredictiveAnalysisCorporateEspionageOrganizedCrimeAttackersWhite-HatHackersClosed-SourceIntelligenceRevengeAttacksEspionageAttacksThreatVectorsIoCsThreatMapsDarkWebNation-StateAttackersTTPsServiceDisruptionAttacksEthicalAttacksAPTsZero-DayAttacksISACsSTIXShadowITOSINTFinancialGainAttacksThreatIntelligenceThreatActorsDataExfiltrationAttacksBlackmailAttacksVulnerabilityDatabasesGray-HatHackersScriptKiddieHacktivistsFree!Disruption-ChaosAttacksWarAttacksInsiderThreatBlack-HatHackersPhilosophical-Political BeliefAttacksAttackSurfacesPredictiveAnalysisCorporateEspionageOrganizedCrimeAttackersWhite-HatHackersClosed-SourceIntelligenceRevengeAttacksEspionageAttacksThreatVectorsIoCsThreatMapsDarkWebNation-StateAttackersTTPsServiceDisruptionAttacksEthicalAttacksAPTsZero-DayAttacksISACs

CHAPTER 2 SEC+ - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
  1. STIX
  2. Shadow IT
  3. OSINT
  4. Financial Gain Attacks
  5. Threat Intelligence
  6. Threat Actors
  7. Data Exfiltration Attacks
  8. Blackmail Attacks
  9. Vulnerability Databases
  10. Gray-Hat Hackers
  11. Script Kiddie
  12. Hacktivists
  13. Free!
  14. Disruption-Chaos Attacks
  15. War Attacks
  16. Insider Threat
  17. Black-Hat Hackers
  18. Philosophical-Political Belief Attacks
  19. Attack Surfaces
  20. Predictive Analysis
  21. Corporate Espionage
  22. Organized Crime Attackers
  23. White-Hat Hackers
  24. Closed-Source Intelligence
  25. Revenge Attacks
  26. Espionage Attacks
  27. Threat Vectors
  28. IoCs
  29. Threat Maps
  30. Dark Web
  31. Nation-State Attackers
  32. TTPs
  33. Service Disruption Attacks
  34. Ethical Attacks
  35. APTs
  36. Zero-Day Attacks
  37. ISACs