ScriptKiddieClosed-SourceIntelligenceEthicalAttacksAttackSurfacesThreatActorsDarkWebDisruption-ChaosAttacksTTPsGray-HatHackersNation-StateAttackersWarAttacksServiceDisruptionAttacksEspionageAttacksThreatVectorsCorporateEspionageSTIXFinancialGainAttacksIoCsThreatMapsISACsBlack-HatHackersDataExfiltrationAttacksWhite-HatHackersOSINTRevengeAttacksHacktivistsZero-DayAttacksThreatIntelligenceInsiderThreatPhilosophical-Political BeliefAttacksPredictiveAnalysisOrganizedCrimeAttackersBlackmailAttacksShadowITAPTsVulnerabilityDatabasesFree!ScriptKiddieClosed-SourceIntelligenceEthicalAttacksAttackSurfacesThreatActorsDarkWebDisruption-ChaosAttacksTTPsGray-HatHackersNation-StateAttackersWarAttacksServiceDisruptionAttacksEspionageAttacksThreatVectorsCorporateEspionageSTIXFinancialGainAttacksIoCsThreatMapsISACsBlack-HatHackersDataExfiltrationAttacksWhite-HatHackersOSINTRevengeAttacksHacktivistsZero-DayAttacksThreatIntelligenceInsiderThreatPhilosophical-Political BeliefAttacksPredictiveAnalysisOrganizedCrimeAttackersBlackmailAttacksShadowITAPTsVulnerabilityDatabasesFree!

CHAPTER 2 SEC+ - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
  1. Script Kiddie
  2. Closed-Source Intelligence
  3. Ethical Attacks
  4. Attack Surfaces
  5. Threat Actors
  6. Dark Web
  7. Disruption-Chaos Attacks
  8. TTPs
  9. Gray-Hat Hackers
  10. Nation-State Attackers
  11. War Attacks
  12. Service Disruption Attacks
  13. Espionage Attacks
  14. Threat Vectors
  15. Corporate Espionage
  16. STIX
  17. Financial Gain Attacks
  18. IoCs
  19. Threat Maps
  20. ISACs
  21. Black-Hat Hackers
  22. Data Exfiltration Attacks
  23. White-Hat Hackers
  24. OSINT
  25. Revenge Attacks
  26. Hacktivists
  27. Zero-Day Attacks
  28. Threat Intelligence
  29. Insider Threat
  30. Philosophical-Political Belief Attacks
  31. Predictive Analysis
  32. Organized Crime Attackers
  33. Blackmail Attacks
  34. Shadow IT
  35. APTs
  36. Vulnerability Databases
  37. Free!