IoCsTTPsPhilosophical-Political BeliefAttacksInsiderThreatPredictiveAnalysisAttackSurfacesSTIXBlackmailAttacksClosed-SourceIntelligenceWarAttacksThreatActorsEthicalAttacksThreatVectorsOrganizedCrimeAttackersBlack-HatHackersVulnerabilityDatabasesThreatMapsScriptKiddieDarkWebServiceDisruptionAttacksShadowITFinancialGainAttacksDisruption-ChaosAttacksCorporateEspionageISACsNation-StateAttackersAPTsOSINTZero-DayAttacksThreatIntelligenceDataExfiltrationAttacksWhite-HatHackersEspionageAttacksHacktivistsFree!Gray-HatHackersRevengeAttacksIoCsTTPsPhilosophical-Political BeliefAttacksInsiderThreatPredictiveAnalysisAttackSurfacesSTIXBlackmailAttacksClosed-SourceIntelligenceWarAttacksThreatActorsEthicalAttacksThreatVectorsOrganizedCrimeAttackersBlack-HatHackersVulnerabilityDatabasesThreatMapsScriptKiddieDarkWebServiceDisruptionAttacksShadowITFinancialGainAttacksDisruption-ChaosAttacksCorporateEspionageISACsNation-StateAttackersAPTsOSINTZero-DayAttacksThreatIntelligenceDataExfiltrationAttacksWhite-HatHackersEspionageAttacksHacktivistsFree!Gray-HatHackersRevengeAttacks

CHAPTER 2 SEC+ - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
  1. IoCs
  2. TTPs
  3. Philosophical-Political Belief Attacks
  4. Insider Threat
  5. Predictive Analysis
  6. Attack Surfaces
  7. STIX
  8. Blackmail Attacks
  9. Closed-Source Intelligence
  10. War Attacks
  11. Threat Actors
  12. Ethical Attacks
  13. Threat Vectors
  14. Organized Crime Attackers
  15. Black-Hat Hackers
  16. Vulnerability Databases
  17. Threat Maps
  18. Script Kiddie
  19. Dark Web
  20. Service Disruption Attacks
  21. Shadow IT
  22. Financial Gain Attacks
  23. Disruption-Chaos Attacks
  24. Corporate Espionage
  25. ISACs
  26. Nation-State Attackers
  27. APTs
  28. OSINT
  29. Zero-Day Attacks
  30. Threat Intelligence
  31. Data Exfiltration Attacks
  32. White-Hat Hackers
  33. Espionage Attacks
  34. Hacktivists
  35. Free!
  36. Gray-Hat Hackers
  37. Revenge Attacks