TTPsBlack-HatHackersEthicalAttacksSTIXDisruption-ChaosAttacksGray-HatHackersShadowITFree!IoCsDarkWebFinancialGainAttacksWarAttacksAPTsThreatMapsThreatVectorsAttackSurfacesCorporateEspionageInsiderThreatRevengeAttacksVulnerabilityDatabasesOSINTPredictiveAnalysisISACsScriptKiddieBlackmailAttacksDataExfiltrationAttacksOrganizedCrimeAttackersEspionageAttacksWhite-HatHackersZero-DayAttacksServiceDisruptionAttacksClosed-SourceIntelligenceThreatIntelligencePhilosophical-Political BeliefAttacksHacktivistsNation-StateAttackersThreatActorsTTPsBlack-HatHackersEthicalAttacksSTIXDisruption-ChaosAttacksGray-HatHackersShadowITFree!IoCsDarkWebFinancialGainAttacksWarAttacksAPTsThreatMapsThreatVectorsAttackSurfacesCorporateEspionageInsiderThreatRevengeAttacksVulnerabilityDatabasesOSINTPredictiveAnalysisISACsScriptKiddieBlackmailAttacksDataExfiltrationAttacksOrganizedCrimeAttackersEspionageAttacksWhite-HatHackersZero-DayAttacksServiceDisruptionAttacksClosed-SourceIntelligenceThreatIntelligencePhilosophical-Political BeliefAttacksHacktivistsNation-StateAttackersThreatActors

CHAPTER 2 SEC+ - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
  1. TTPs
  2. Black-Hat Hackers
  3. Ethical Attacks
  4. STIX
  5. Disruption-Chaos Attacks
  6. Gray-Hat Hackers
  7. Shadow IT
  8. Free!
  9. IoCs
  10. Dark Web
  11. Financial Gain Attacks
  12. War Attacks
  13. APTs
  14. Threat Maps
  15. Threat Vectors
  16. Attack Surfaces
  17. Corporate Espionage
  18. Insider Threat
  19. Revenge Attacks
  20. Vulnerability Databases
  21. OSINT
  22. Predictive Analysis
  23. ISACs
  24. Script Kiddie
  25. Blackmail Attacks
  26. Data Exfiltration Attacks
  27. Organized Crime Attackers
  28. Espionage Attacks
  29. White-Hat Hackers
  30. Zero-Day Attacks
  31. Service Disruption Attacks
  32. Closed-Source Intelligence
  33. Threat Intelligence
  34. Philosophical-Political Belief Attacks
  35. Hacktivists
  36. Nation-State Attackers
  37. Threat Actors