HacktivistsPredictiveAnalysisBlackmailAttacksTTPsServiceDisruptionAttacksThreatVectorsVulnerabilityDatabasesDisruption-ChaosAttacksCorporateEspionageNation-StateAttackersInsiderThreatISACsEthicalAttacksEspionageAttacksRevengeAttacksThreatMapsBlack-HatHackersClosed-SourceIntelligenceSTIXFree!Philosophical-Political BeliefAttacksAttackSurfacesScriptKiddieDataExfiltrationAttacksIoCsDarkWebZero-DayAttacksWarAttacksShadowITOSINTThreatActorsOrganizedCrimeAttackersThreatIntelligenceFinancialGainAttacksWhite-HatHackersGray-HatHackersAPTsHacktivistsPredictiveAnalysisBlackmailAttacksTTPsServiceDisruptionAttacksThreatVectorsVulnerabilityDatabasesDisruption-ChaosAttacksCorporateEspionageNation-StateAttackersInsiderThreatISACsEthicalAttacksEspionageAttacksRevengeAttacksThreatMapsBlack-HatHackersClosed-SourceIntelligenceSTIXFree!Philosophical-Political BeliefAttacksAttackSurfacesScriptKiddieDataExfiltrationAttacksIoCsDarkWebZero-DayAttacksWarAttacksShadowITOSINTThreatActorsOrganizedCrimeAttackersThreatIntelligenceFinancialGainAttacksWhite-HatHackersGray-HatHackersAPTs

CHAPTER 2 SEC+ - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
  1. Hacktivists
  2. Predictive Analysis
  3. Blackmail Attacks
  4. TTPs
  5. Service Disruption Attacks
  6. Threat Vectors
  7. Vulnerability Databases
  8. Disruption-Chaos Attacks
  9. Corporate Espionage
  10. Nation-State Attackers
  11. Insider Threat
  12. ISACs
  13. Ethical Attacks
  14. Espionage Attacks
  15. Revenge Attacks
  16. Threat Maps
  17. Black-Hat Hackers
  18. Closed-Source Intelligence
  19. STIX
  20. Free!
  21. Philosophical-Political Belief Attacks
  22. Attack Surfaces
  23. Script Kiddie
  24. Data Exfiltration Attacks
  25. IoCs
  26. Dark Web
  27. Zero-Day Attacks
  28. War Attacks
  29. Shadow IT
  30. OSINT
  31. Threat Actors
  32. Organized Crime Attackers
  33. Threat Intelligence
  34. Financial Gain Attacks
  35. White-Hat Hackers
  36. Gray-Hat Hackers
  37. APTs