APTsClosed-SourceIntelligenceOrganizedCrimeAttackersGray-HatHackersNation-StateAttackersPredictiveAnalysisThreatIntelligenceBlack-HatHackersHacktivistsServiceDisruptionAttacksAttackSurfacesWarAttacksEthicalAttacksBlackmailAttacksFree!RevengeAttacksCorporateEspionageOSINTISACsTTPsThreatActorsThreatVectorsFinancialGainAttacksShadowITVulnerabilityDatabasesPhilosophical-Political BeliefAttacksDarkWebSTIXIoCsDataExfiltrationAttacksThreatMapsZero-DayAttacksWhite-HatHackersInsiderThreatDisruption-ChaosAttacksEspionageAttacksScriptKiddieAPTsClosed-SourceIntelligenceOrganizedCrimeAttackersGray-HatHackersNation-StateAttackersPredictiveAnalysisThreatIntelligenceBlack-HatHackersHacktivistsServiceDisruptionAttacksAttackSurfacesWarAttacksEthicalAttacksBlackmailAttacksFree!RevengeAttacksCorporateEspionageOSINTISACsTTPsThreatActorsThreatVectorsFinancialGainAttacksShadowITVulnerabilityDatabasesPhilosophical-Political BeliefAttacksDarkWebSTIXIoCsDataExfiltrationAttacksThreatMapsZero-DayAttacksWhite-HatHackersInsiderThreatDisruption-ChaosAttacksEspionageAttacksScriptKiddie

CHAPTER 2 SEC+ - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
  1. APTs
  2. Closed-Source Intelligence
  3. Organized Crime Attackers
  4. Gray-Hat Hackers
  5. Nation-State Attackers
  6. Predictive Analysis
  7. Threat Intelligence
  8. Black-Hat Hackers
  9. Hacktivists
  10. Service Disruption Attacks
  11. Attack Surfaces
  12. War Attacks
  13. Ethical Attacks
  14. Blackmail Attacks
  15. Free!
  16. Revenge Attacks
  17. Corporate Espionage
  18. OSINT
  19. ISACs
  20. TTPs
  21. Threat Actors
  22. Threat Vectors
  23. Financial Gain Attacks
  24. Shadow IT
  25. Vulnerability Databases
  26. Philosophical-Political Belief Attacks
  27. Dark Web
  28. STIX
  29. IoCs
  30. Data Exfiltration Attacks
  31. Threat Maps
  32. Zero-Day Attacks
  33. White-Hat Hackers
  34. Insider Threat
  35. Disruption-Chaos Attacks
  36. Espionage Attacks
  37. Script Kiddie