Glitch effectGlitch effectGlitch effect

Huntress Security Awareness
Training Episodes

Explore the world of Currivulaville through our Huntress Security Awareness Training
episode library. Learn about cybersecurity by taking a journey with heroes, villains, and stories—
all designed to make employees smarter with their cybersecurity decisions.

Glitch effectBlue ellipse
Topic
Down arrow
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Glitch effect
Teal gradient Glitch effect
Showing
Showing
of
Showing
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Adversary in the Middle
Huntress Cybersecurity

Adversary in the Middle

Phishing
phishing
Remote Work
Huntress Cybersecurity

Remote Work

Shoulder Surfing
Locking Devices
Public Wifi
Securing Devices
shoulder-surfing, locking-devices, public-wifi, securing-devices
Studio Tour Troubles
Huntress Cybersecurity

Studio Tour Troubles

Locking Devices
locking-devices
Clean Desk
Huntress Cybersecurity

Clean Desk

Clean Desk
Physical Access
clean-desk, physical access
Phishing
Huntress Cybersecurity

Phishing

Phishing
Clean Desk
phishing, clean-desk
GDPR
Huntress Cybersecurity

GDPR

GDPR
gdpr
NERC CIP
Huntress Cybersecurity

NERC CIP

NERC CIP
Compliance Training
nerc-cip, compliance-training
SOC 2
Huntress Cybersecurity

SOC 2

SOC 2
soc-2
The Reckoning
Huntress Cybersecurity

The Reckoning

Confidential Info
confidential-info
Viral Encounters of the Third Kind
Huntress Cybersecurity

Viral Encounters of the Third Kind

Malware
malware
One of a Kind
Huntress Cybersecurity

One of a Kind

Password Reuse
password-reuse
21 Jump Drive
Huntress Cybersecurity

21 Jump Drive

Removeable Media
removeable-media
Super Multi-Factor Breakthrough
Huntress Cybersecurity

Super Multi-Factor Breakthrough

Multi-Factor
multi-factor
Downward-Facing Bank Account
Huntress Cybersecurity

Downward-Facing Bank Account

Mobile Devices
mobile-devices
A BopTalk Carol
Huntress Cybersecurity

A BopTalk Carol

Privacy
privacy
Jelly Flop
Huntress Cybersecurity

Jelly Flop

Business Email Compromise
business-email-compromise
Information Security
Huntress Cybersecurity

Information Security

Information Security
Access Controls
information-security
First Day Fiasco
Huntress Cybersecurity

First Day Fiasco

Gift Card Scam
gift-card-scam
Cookie Crushed
Huntress Cybersecurity

Cookie Crushed

Ransomware
ransomware
Incident Response
Huntress Cybersecurity

Incident Response

Incident Response
Backup & Recovery
incident-response
Roses and Ruins
Huntress Cybersecurity

Roses and Ruins

Smishing
smishing
Phishing Defense
Huntress Cybersecurity

Phishing Defense

Phishing
Phishing Defense
phishing, phishing-defense
Intro to Cybersecurity
Huntress Cybersecurity

Intro to Cybersecurity

Intro to Cybersecurity
intro-to-cybersecurity
The Password Kid
Huntress Cybersecurity

The Password Kid

Passwords
passwords
Plenty of Passwords
Huntress Cybersecurity

Plenty of Passwords

Passwords
Password Manager
passwords, password-manager
PCI
Huntress Cybersecurity

PCI

Compliance Training
PCI
compliance-training, pci
Wifi in Paradise Wifi
Huntress Cybersecurity

Wifi in Paradise Wifi

Wifi
wifi
Weasley Impossible
Huntress Cybersecurity

Weasley Impossible

Physical Security
Weapons of Social Media Destruction
Huntress Cybersecurity

Weapons of Social Media Destruction

Social Media
Singing for a Phish
Huntress Cybersecurity

Singing for a Phish

Social Engineering
social-engineering
Enter the Simulation
Huntress Cybersecurity

Enter the Simulation

Secure Browsing
secure-browsing
Bot-head
Bot-head
,
Imani
Imani
,
Sloth
Sloth
,
Sheep
Sheep
,
Rhino
Rhino
,
Pecan Man
Pecan Man
,
Orzo
Orzo
,
Julius
Julius
,
Bernie
Bernie
,
Noah
Noah
,
Kristin
Kristin
,
Harper
Harper
,
Christopher
Christopher
,
Brent G.
Brent G.
,
Joshhh
Joshhh
,
Brock
Brock
,
Ali
Ali
,
Phil
Phil
,
Brute Force
Brute Force
,
Peter
Peter
,
Hal
Hal
,
Tom
Tom
,
Don
Don
,
Todd
Todd
,
Susan Salamander
Susan Salamander
,
Craig
Craig
,
Hank
Hank
,
Billy
Billy
,
Barbara
Barbara
,
Frank
Frank
,
Arthur
Arthur
,
Matt
Matt
,
Benson
Benson
,
Michelle
Michelle
,
Heather
Heather
,
Dr. Cookay
Dr. Cookay
,
Passmaster
Passmaster
,
Paige
Paige
,
Bryson Bee
Bryson Bee
,
Professor Bogusat
Professor Bogusat
,
Marcello
Marcello
,
Phillipe
Phillipe
,
Cork
Cork
,
Brooke
Brooke
,
Toucan Man
Toucan Man
,
Eli
Eli
,
Skorms
Skorms
,
DeeDee
DeeDee
,
Quincy
Quincy
,
Weasley
Weasley
,
Joe Cannoli
Joe Cannoli
,
Moe Cannoli
Moe Cannoli
,
Access Controls
Access Controls
Backup & Recovery
Backup & Recovery
Physical Access
Physical Access
AiTM
AiTM
Securing Devices
Securing Devices
Public Wifi
Public Wifi
Locking Devices
Locking Devices
Shoulder Surfing
Shoulder Surfing
Secure Browsing
Secure Browsing
Social Engineering
Social Engineering
Social Media
Social Media
Physical Security
Physical Security
Wifi
Wifi
Password Manager
Password Manager
Phishing Defense
Phishing Defense
PCI
PCI
Intro to Cybersecurity
Intro to Cybersecurity
Passwords
Passwords
Locking Devices
Locking Devices
Smishing
Smishing
Incident Response
Incident Response
Ransomware
Ransomware
Gift Card Scam
Gift Card Scam
Information Security
Information Security
Business Email Compromise
Business Email Compromise
Privacy
Privacy
Mobile Devices
Mobile Devices
Multi-Factor
Multi-Factor
Removeable Media
Removeable Media
Password Reuse
Password Reuse
Malware
Malware
Confidential Info
Confidential Info
SOC 2
SOC 2
Compliance Training
Compliance Training
NERC CIP
NERC CIP
GDPR
GDPR
Phishing
Phishing
Clean Desk
Clean Desk
Glitch effectGlitch effectBlue ellipse

Provide an Impactful SAT Experience

Don’t just check a compliance box. Elevate your workplace’s security culture while giving your employees an enjoyable experience.

Try Huntress SAT for Free
security culture illustration