PredictiveAnalysisScriptKiddieIoCsOrganizedCrimeAttackersGray-HatHackersDisruption-ChaosAttacksRevengeAttacksVulnerabilityDatabasesEthicalAttacksClosed-SourceIntelligenceTTPsInsiderThreatBlack-HatHackersThreatMapsEspionageAttacksOSINTWhite-HatHackersCorporateEspionageFinancialGainAttacksDataExfiltrationAttacksShadowITThreatActorsBlackmailAttacksFree!AttackSurfacesHacktivistsSTIXPhilosophical-Political BeliefAttacksNation-StateAttackersWarAttacksDarkWebZero-DayAttacksAPTsISACsThreatVectorsThreatIntelligenceServiceDisruptionAttacksPredictiveAnalysisScriptKiddieIoCsOrganizedCrimeAttackersGray-HatHackersDisruption-ChaosAttacksRevengeAttacksVulnerabilityDatabasesEthicalAttacksClosed-SourceIntelligenceTTPsInsiderThreatBlack-HatHackersThreatMapsEspionageAttacksOSINTWhite-HatHackersCorporateEspionageFinancialGainAttacksDataExfiltrationAttacksShadowITThreatActorsBlackmailAttacksFree!AttackSurfacesHacktivistsSTIXPhilosophical-Political BeliefAttacksNation-StateAttackersWarAttacksDarkWebZero-DayAttacksAPTsISACsThreatVectorsThreatIntelligenceServiceDisruptionAttacks

CHAPTER 2 SEC+ - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
  1. Predictive Analysis
  2. Script Kiddie
  3. IoCs
  4. Organized Crime Attackers
  5. Gray-Hat Hackers
  6. Disruption-Chaos Attacks
  7. Revenge Attacks
  8. Vulnerability Databases
  9. Ethical Attacks
  10. Closed-Source Intelligence
  11. TTPs
  12. Insider Threat
  13. Black-Hat Hackers
  14. Threat Maps
  15. Espionage Attacks
  16. OSINT
  17. White-Hat Hackers
  18. Corporate Espionage
  19. Financial Gain Attacks
  20. Data Exfiltration Attacks
  21. Shadow IT
  22. Threat Actors
  23. Blackmail Attacks
  24. Free!
  25. Attack Surfaces
  26. Hacktivists
  27. STIX
  28. Philosophical-Political Belief Attacks
  29. Nation-State Attackers
  30. War Attacks
  31. Dark Web
  32. Zero-Day Attacks
  33. APTs
  34. ISACs
  35. Threat Vectors
  36. Threat Intelligence
  37. Service Disruption Attacks