Explore the world of Currivulaville through our Huntress Security Awareness Training episode library. Learn about cybersecurity by taking a journey with heroes, villains, and stories— all designed to make employees smarter with their cybersecurity decisions.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
In this episode Bot-Head is looking to build something very special for the Curriculaville Comic-Con, but with a low balance in her bank account, she may have to turn to an AiTM attack to finance her project.
Imani is taking a much needed vacation, but when someone catches wind of a big deal her company is working on, will she be able to protect the incredibly valuable details while working remotely?
Cannoli Brothers Construction is bidding for a massive project, Super Space City, but Weasley, the janitor, steals sensitive documents and sells them to a competitor. Protecting sensitive information isn't just about digital security—it’s about physical security too. A Clean Desk Program helps manage physical access to sensitive documents and workspaces, ensuring confidential materials aren’t left exposed. Can Cannoli Brothers prevent sensitive information from falling into the wrong hands?
Following the completion of this episode, learners should be able to:
Summarize the purpose of a Clean Desk Program
Recognize the need to physically protect sensitive information
Learn techniques to secure devices and documents from theft
Moo Moo’s Ice Cream is about to face a cyber attack, but not from where you'd expect. A clever 5-year-old named DeeDee uses phishing tactics to exact her revenge on the company. As DeeDee’s scheme unfolds, employees are tricked into revealing sensitive information, highlighting the dangers of phishing.
Following the completion of this episode, learners should be able to:
Summarize phishing and its associated risks
Identify tactics hackers use to execute phishing attacks
Learn about the different requirements and concepts behind the GDPR regulation. As data continues to flow to different locations in or outside the European Union, everyone play a role in protecting that data.
Learn the basic principals of the NERC CIP compliance framework dedicated to helping protect the North American power grid from cyber attacks. Enjoy a visual representation of complex regulatory standards broken down into easy to understand concepts.
The SKORMS love ordering various items from Earth, but they hate when their packages don’t make it to them. Follow the journey on how SOC 2 helped save and industry struggling to stay secure and protect their customer’s data.
Ernest is working on marketing materials for Toucan Man III, when his son Eli discovers the script for the upcoming film about his favorite super hero. Will Eli's actions be the only chance to save his hero and give the world a chance to fight another day?
A mysterious email infects utility companies all over the world with a nasty virus. Who is the hacker behind this attack and more importantly, will the quick-thinking malware analyst Brooke be able to stop it?
Phillipe, the art curator for the Don Abbrucci gallery, is auctioning off a stunning new painting, The Creation of Sloth. Watch why Phillipe’s choice to reuse his passwords becomes a hacker’s masterpiece.
Professor Bogusat finds an ordinary looking flash drive lying around Bryson University campus. But an innocent look through its content, might lead Bryson down a dark and gloomy future.
When Heather enters a room, everyone knows it. While she doesn’t seem to care much about annoying others, she's about to experience one of the most annoying days of her life.
Twas the night before Christmas and inside the office, BopTalk founder Matt is warned to be cautious! A spiritual mentor shows Matt his present, future, and past. Will the choice to sell user data end up being his last?
Frank’s Famous PB&J; just closed a huge deal with Roaster’s Peanut Butter! Everything seems to be going great until Frank makes the biggest mistake on his trip back to headquarters. Will Frank’s business make it, or will his situation get a little nutty?
Billy starts his internship at Mom and Pop’s Hover Labs, but when his friends ask about his work, he unknowingly risks exposing sensitive information. Information security is about protecting data from unauthorized access or misuse. Securing this data is vital, as it holds an organization’s value and must be safeguarded to meet legal obligations. Will Billy keep the company's secrets safe?
Following the completion of this episode, learners should be able to:
Identify different types of sensitive information
Understand the purpose of an information protection program
Apply the “Need to Know” principle to protect sensitive data
It’s Craig’s first day as an office manager at Balloon Marketing when a quick email from his boss changes everything. Will Craig’s first day be his last?
Cookie Crush is the hottest new game that everyone is downloading, but it might be more dangerous than it seems. Will Dr. Cookay’s latest scheme pay off, or will Adam the IT Manager have his cookies get crumbled?
A cyber attack has hit Van Saun Zoo, and it's up to Don, the night shift hero, to save the animals from disaster. With chaos unfolding, Don must find the incident response plan—if he can remember where it’s kept. Incident response is a crucial, organized approach to handling cybersecurity incidents. Knowing how to respond and report a breach is key to minimizing damage. Can Don stop the attack in time to save the zoo?
Following the completion of this episode, learners should be able to:some text
Identify and report a cybersecurity incident
Summarize key steps in an incident response plan
Recognize the importance of practicing mock cybersecurity incidents
Understand the need to regularly update the incident response plan
It's almost Valentines day, Steph's busiest day of the year for selling flowers! When Steph gets a text asking her to update her banking information, she doesn't think twice about it. Things might not be so rosy tomorrow when she finds out not everyone's heart is in the right place.
Learn some of the basic principals that every person needs to know on how to defend themselves against cyber attacks including: passwords, multi-factor authentication, phishing, and much more.
Peter is transported to the digital world to learn from the wise PassMaster. Will Peter’s new training unlock the skills to create a password strong enough to stop the hackers?
Phil’s vacation quickly becomes a miserable experience when Tom keeps getting in his way. You never know what someone would be willing to do for peace and quiet… and their tropical umbrella drink.
Weasley has his eye on Gigantic Mutual Bank, but he needs a plan if he wants to steal all their money. Will Weasley figure out how to break in? Or will his mission fail miserably like everything else he’s ever done?
It’s easy to become anyone in the world of social media. DeeDee won't let anything get between her and her popstar idol, Joshhh. Find out just how far DeeDee will go just to be in the same room as her crush.
Kristin is ready for another boring training session about secure Internet browsing. Follow her adventure as she explores the dark side of the Internet using Noah’s hi-tech Browser Simulator.