TTPsFinancialGainAttacksISACsNation-StateAttackersWarAttacksEspionageAttacksOSINTOrganizedCrimeAttackersPhilosophical-Political BeliefAttacksClosed-SourceIntelligenceScriptKiddiePredictiveAnalysisShadowITThreatVectorsRevengeAttacksCorporateEspionageInsiderThreatGray-HatHackersServiceDisruptionAttacksSTIXThreatIntelligenceThreatMapsDataExfiltrationAttacksHacktivistsVulnerabilityDatabasesZero-DayAttacksThreatActorsBlackmailAttacksWhite-HatHackersFree!Black-HatHackersIoCsDarkWebAttackSurfacesEthicalAttacksDisruption-ChaosAttacksAPTsTTPsFinancialGainAttacksISACsNation-StateAttackersWarAttacksEspionageAttacksOSINTOrganizedCrimeAttackersPhilosophical-Political BeliefAttacksClosed-SourceIntelligenceScriptKiddiePredictiveAnalysisShadowITThreatVectorsRevengeAttacksCorporateEspionageInsiderThreatGray-HatHackersServiceDisruptionAttacksSTIXThreatIntelligenceThreatMapsDataExfiltrationAttacksHacktivistsVulnerabilityDatabasesZero-DayAttacksThreatActorsBlackmailAttacksWhite-HatHackersFree!Black-HatHackersIoCsDarkWebAttackSurfacesEthicalAttacksDisruption-ChaosAttacksAPTs

CHAPTER 2 SEC+ - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
  1. TTPs
  2. Financial Gain Attacks
  3. ISACs
  4. Nation-State Attackers
  5. War Attacks
  6. Espionage Attacks
  7. OSINT
  8. Organized Crime Attackers
  9. Philosophical-Political Belief Attacks
  10. Closed-Source Intelligence
  11. Script Kiddie
  12. Predictive Analysis
  13. Shadow IT
  14. Threat Vectors
  15. Revenge Attacks
  16. Corporate Espionage
  17. Insider Threat
  18. Gray-Hat Hackers
  19. Service Disruption Attacks
  20. STIX
  21. Threat Intelligence
  22. Threat Maps
  23. Data Exfiltration Attacks
  24. Hacktivists
  25. Vulnerability Databases
  26. Zero-Day Attacks
  27. Threat Actors
  28. Blackmail Attacks
  29. White-Hat Hackers
  30. Free!
  31. Black-Hat Hackers
  32. IoCs
  33. Dark Web
  34. Attack Surfaces
  35. Ethical Attacks
  36. Disruption-Chaos Attacks
  37. APTs