ThreatVectorsShadowITDisruption-ChaosAttacksFree!TTPsFinancialGainAttacksAPTsZero-DayAttacksISACsDarkWebRevengeAttacksHacktivistsAttackSurfacesThreatMapsSTIXEthicalAttacksDataExfiltrationAttacksScriptKiddieClosed-SourceIntelligenceWarAttacksThreatActorsEspionageAttacksPredictiveAnalysisNation-StateAttackersCorporateEspionageOSINTInsiderThreatServiceDisruptionAttacksWhite-HatHackersBlack-HatHackersIoCsOrganizedCrimeAttackersVulnerabilityDatabasesThreatIntelligencePhilosophical-Political BeliefAttacksBlackmailAttacksGray-HatHackersThreatVectorsShadowITDisruption-ChaosAttacksFree!TTPsFinancialGainAttacksAPTsZero-DayAttacksISACsDarkWebRevengeAttacksHacktivistsAttackSurfacesThreatMapsSTIXEthicalAttacksDataExfiltrationAttacksScriptKiddieClosed-SourceIntelligenceWarAttacksThreatActorsEspionageAttacksPredictiveAnalysisNation-StateAttackersCorporateEspionageOSINTInsiderThreatServiceDisruptionAttacksWhite-HatHackersBlack-HatHackersIoCsOrganizedCrimeAttackersVulnerabilityDatabasesThreatIntelligencePhilosophical-Political BeliefAttacksBlackmailAttacksGray-HatHackers

CHAPTER 2 SEC+ - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
  1. Threat Vectors
  2. Shadow IT
  3. Disruption-Chaos Attacks
  4. Free!
  5. TTPs
  6. Financial Gain Attacks
  7. APTs
  8. Zero-Day Attacks
  9. ISACs
  10. Dark Web
  11. Revenge Attacks
  12. Hacktivists
  13. Attack Surfaces
  14. Threat Maps
  15. STIX
  16. Ethical Attacks
  17. Data Exfiltration Attacks
  18. Script Kiddie
  19. Closed-Source Intelligence
  20. War Attacks
  21. Threat Actors
  22. Espionage Attacks
  23. Predictive Analysis
  24. Nation-State Attackers
  25. Corporate Espionage
  26. OSINT
  27. Insider Threat
  28. Service Disruption Attacks
  29. White-Hat Hackers
  30. Black-Hat Hackers
  31. IoCs
  32. Organized Crime Attackers
  33. Vulnerability Databases
  34. Threat Intelligence
  35. Philosophical-Political Belief Attacks
  36. Blackmail Attacks
  37. Gray-Hat Hackers