ThreatIntelligenceEspionageAttacksCorporateEspionageZero-DayAttacksDarkWebNation-StateAttackersPredictiveAnalysisGray-HatHackersBlack-HatHackersScriptKiddieOrganizedCrimeAttackersFinancialGainAttacksThreatMapsIoCsEthicalAttacksWarAttacksTTPsFree!BlackmailAttacksVulnerabilityDatabasesDataExfiltrationAttacksAttackSurfacesClosed-SourceIntelligenceISACsAPTsRevengeAttacksServiceDisruptionAttacksInsiderThreatOSINTSTIXDisruption-ChaosAttacksThreatActorsWhite-HatHackersPhilosophical-Political BeliefAttacksThreatVectorsShadowITHacktivistsThreatIntelligenceEspionageAttacksCorporateEspionageZero-DayAttacksDarkWebNation-StateAttackersPredictiveAnalysisGray-HatHackersBlack-HatHackersScriptKiddieOrganizedCrimeAttackersFinancialGainAttacksThreatMapsIoCsEthicalAttacksWarAttacksTTPsFree!BlackmailAttacksVulnerabilityDatabasesDataExfiltrationAttacksAttackSurfacesClosed-SourceIntelligenceISACsAPTsRevengeAttacksServiceDisruptionAttacksInsiderThreatOSINTSTIXDisruption-ChaosAttacksThreatActorsWhite-HatHackersPhilosophical-Political BeliefAttacksThreatVectorsShadowITHacktivists

CHAPTER 2 SEC+ - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
  1. Threat Intelligence
  2. Espionage Attacks
  3. Corporate Espionage
  4. Zero-Day Attacks
  5. Dark Web
  6. Nation-State Attackers
  7. Predictive Analysis
  8. Gray-Hat Hackers
  9. Black-Hat Hackers
  10. Script Kiddie
  11. Organized Crime Attackers
  12. Financial Gain Attacks
  13. Threat Maps
  14. IoCs
  15. Ethical Attacks
  16. War Attacks
  17. TTPs
  18. Free!
  19. Blackmail Attacks
  20. Vulnerability Databases
  21. Data Exfiltration Attacks
  22. Attack Surfaces
  23. Closed-Source Intelligence
  24. ISACs
  25. APTs
  26. Revenge Attacks
  27. Service Disruption Attacks
  28. Insider Threat
  29. OSINT
  30. STIX
  31. Disruption-Chaos Attacks
  32. Threat Actors
  33. White-Hat Hackers
  34. Philosophical-Political Belief Attacks
  35. Threat Vectors
  36. Shadow IT
  37. Hacktivists