DataExfiltrationAttacksEthicalAttacksShadowITClosed-SourceIntelligenceNation-StateAttackersISACsGray-HatHackersScriptKiddieAPTsDisruption-ChaosAttacksIoCsPredictiveAnalysisVulnerabilityDatabasesPhilosophical-Political BeliefAttacksOSINTZero-DayAttacksThreatIntelligenceThreatActorsRevengeAttacksFree!White-HatHackersSTIXWarAttacksBlack-HatHackersInsiderThreatTTPsHacktivistsThreatVectorsServiceDisruptionAttacksAttackSurfacesCorporateEspionageOrganizedCrimeAttackersThreatMapsEspionageAttacksDarkWebFinancialGainAttacksBlackmailAttacksDataExfiltrationAttacksEthicalAttacksShadowITClosed-SourceIntelligenceNation-StateAttackersISACsGray-HatHackersScriptKiddieAPTsDisruption-ChaosAttacksIoCsPredictiveAnalysisVulnerabilityDatabasesPhilosophical-Political BeliefAttacksOSINTZero-DayAttacksThreatIntelligenceThreatActorsRevengeAttacksFree!White-HatHackersSTIXWarAttacksBlack-HatHackersInsiderThreatTTPsHacktivistsThreatVectorsServiceDisruptionAttacksAttackSurfacesCorporateEspionageOrganizedCrimeAttackersThreatMapsEspionageAttacksDarkWebFinancialGainAttacksBlackmailAttacks

CHAPTER 2 SEC+ - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
  1. Data Exfiltration Attacks
  2. Ethical Attacks
  3. Shadow IT
  4. Closed-Source Intelligence
  5. Nation-State Attackers
  6. ISACs
  7. Gray-Hat Hackers
  8. Script Kiddie
  9. APTs
  10. Disruption-Chaos Attacks
  11. IoCs
  12. Predictive Analysis
  13. Vulnerability Databases
  14. Philosophical-Political Belief Attacks
  15. OSINT
  16. Zero-Day Attacks
  17. Threat Intelligence
  18. Threat Actors
  19. Revenge Attacks
  20. Free!
  21. White-Hat Hackers
  22. STIX
  23. War Attacks
  24. Black-Hat Hackers
  25. Insider Threat
  26. TTPs
  27. Hacktivists
  28. Threat Vectors
  29. Service Disruption Attacks
  30. Attack Surfaces
  31. Corporate Espionage
  32. Organized Crime Attackers
  33. Threat Maps
  34. Espionage Attacks
  35. Dark Web
  36. Financial Gain Attacks
  37. Blackmail Attacks