Closed-SourceIntelligenceNation-StateAttackersOrganizedCrimeAttackersCorporateEspionageScriptKiddieWhite-HatHackersRevengeAttacksShadowITHacktivistsDarkWebDisruption-ChaosAttacksOSINTTTPsPredictiveAnalysisThreatIntelligenceISACsThreatVectorsEspionageAttacksThreatActorsWarAttacksDataExfiltrationAttacksFree!STIXAPTsZero-DayAttacksServiceDisruptionAttacksAttackSurfacesFinancialGainAttacksEthicalAttacksPhilosophical-Political BeliefAttacksBlackmailAttacksIoCsInsiderThreatGray-HatHackersBlack-HatHackersThreatMapsVulnerabilityDatabasesClosed-SourceIntelligenceNation-StateAttackersOrganizedCrimeAttackersCorporateEspionageScriptKiddieWhite-HatHackersRevengeAttacksShadowITHacktivistsDarkWebDisruption-ChaosAttacksOSINTTTPsPredictiveAnalysisThreatIntelligenceISACsThreatVectorsEspionageAttacksThreatActorsWarAttacksDataExfiltrationAttacksFree!STIXAPTsZero-DayAttacksServiceDisruptionAttacksAttackSurfacesFinancialGainAttacksEthicalAttacksPhilosophical-Political BeliefAttacksBlackmailAttacksIoCsInsiderThreatGray-HatHackersBlack-HatHackersThreatMapsVulnerabilityDatabases

CHAPTER 2 SEC+ - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
  1. Closed-Source Intelligence
  2. Nation-State Attackers
  3. Organized Crime Attackers
  4. Corporate Espionage
  5. Script Kiddie
  6. White-Hat Hackers
  7. Revenge Attacks
  8. Shadow IT
  9. Hacktivists
  10. Dark Web
  11. Disruption-Chaos Attacks
  12. OSINT
  13. TTPs
  14. Predictive Analysis
  15. Threat Intelligence
  16. ISACs
  17. Threat Vectors
  18. Espionage Attacks
  19. Threat Actors
  20. War Attacks
  21. Data Exfiltration Attacks
  22. Free!
  23. STIX
  24. APTs
  25. Zero-Day Attacks
  26. Service Disruption Attacks
  27. Attack Surfaces
  28. Financial Gain Attacks
  29. Ethical Attacks
  30. Philosophical-Political Belief Attacks
  31. Blackmail Attacks
  32. IoCs
  33. Insider Threat
  34. Gray-Hat Hackers
  35. Black-Hat Hackers
  36. Threat Maps
  37. Vulnerability Databases