Glitch effectGlitch effectGlitch effect

Huntress Security Awareness
Training Episodes

Explore the world of Currivulaville through our Huntress Security Awareness Training
episode library. Learn about cybersecurity by taking a journey with heroes, villains, and stories—
all designed to make employees smarter with their cybersecurity decisions.

This Month's Managed Episode

Don't get Smished

Help your learners avoid becoming a victim of a Smish attack

Smishing
Phishing
Glitch graphic
Glitch effect
Glitch effectBlue ellipse
Topic
Down arrow
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Glitch effect
Teal gradient Glitch effect
Showing
Showing
of
Showing
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Open Source Intelligence (OSINT)
Huntress Cybersecurity

Open Source Intelligence (OSINT)

Phishing
Social Engineering
Tradecraft
phishing, social-engineering, tradecraft
AI Hallucinations
Huntress Cybersecurity

AI Hallucinations

Artificial Intelligence
Core Concepts
artificial-intelligence, core-concepts
HIPAA
Huntress Cybersecurity

HIPAA

Compliance Training
compliance-training
Storing Passwords
Huntress Cybersecurity

Storing Passwords

Passwords
Generative Artificial Intelligence (AI)
Huntress Cybersecurity

Generative Artificial Intelligence (AI)

Information Security
Artificial Intelligence
Email Compromise (BEC) II
Huntress Cybersecurity

Email Compromise (BEC) II

Phishing
Social Engineering
Tradecraft
phishing, social-engineering, tradecraft
Malvertising
Huntress Cybersecurity

Malvertising

Social Engineering
Phishing
Tradecraft
social-engineering, phishing, tradecraft
Suspicious Events
Huntress Cybersecurity

Suspicious Events

Social Engineering
Incident Response & Reporting
social-engineering, incident-reporting
Spear Phishing
Huntress Cybersecurity

Spear Phishing

Phishing
Social Engineering
Tradecraft
phishing, social-engineering, tradecraft
Insider Threat
Huntress Cybersecurity

Insider Threat

Information Security
Core Concepts
information-security, core-concepts
Ransomware II
Huntress Cybersecurity

Ransomware II

Passwords
Information Security
passwords, information-security
Adversary In The Middle (AiTM)
Huntress Cybersecurity

Adversary In The Middle (AiTM)

Phishing
Tradecraft
phishing, tradecraft
Remote Work
Huntress Cybersecurity

Remote Work

Information Security
Core Concepts
shoulder-surfing, locking-devices, public-wifi, securing-devices
Locking Devices
Huntress Cybersecurity

Locking Devices

Core Concepts
Information Security
core-concepts, infromation-security
Clean Desk
Huntress Cybersecurity

Clean Desk

Core Concepts
Information Security
core-concepts, information-security
Phishing
Huntress Cybersecurity

Phishing

Phishing
Social Engineering
Tradecraft
phishing, social-engineering, tradecraft
GDPR
Huntress Cybersecurity

GDPR

Compliance Training
compliance-training
NERC CIP
Huntress Cybersecurity

NERC CIP

Compliance Training
compliance-training
SOC 2
Huntress Cybersecurity

SOC 2

Compliance Training
compliance-training
Confidential Info
Huntress Cybersecurity

Confidential Info

Core Concepts
Information Security
Privacy
core-concepts, information-security, privacy
Malware Attacks
Huntress Cybersecurity

Malware Attacks

Phishing
malware
Password Reuse
Huntress Cybersecurity

Password Reuse

Passwords
Core Concepts
password, core-concepts
Removable Media
Huntress Cybersecurity

Removable Media

Information Security
Tradecraft
Core Concepts
information-security, tradecraft, core-concepts
Multi-Factor Authentication (MFA)
Huntress Cybersecurity

Multi-Factor Authentication (MFA)

Passwords
Information Security
passwords, information-security
Mobile Devices
Huntress Cybersecurity

Mobile Devices

Core Concepts
Information Security
core-concepts, information-security
Privacy
Huntress Cybersecurity

Privacy

Privacy
Information Security
privacy, information-security
Email Compromise (BEC)
Huntress Cybersecurity

Email Compromise (BEC)

Phishing
Social Engineering
Tradecraft
phishing, social-engineering, tradecraft
Information Security
Huntress Cybersecurity

Information Security

Information Security
Core Concepts
information-security, core-concepts
Gift Card Scam
Huntress Cybersecurity

Gift Card Scam

Phishing
Tradecraft
phishing, tradecraft
Ransomware
Huntress Cybersecurity

Ransomware

Incident Response & Reporting
Phishing
Tradecraft
incident-response, phishing, tradecraft
Incident Response
Huntress Cybersecurity

Incident Response

Incident Response & Reporting
Information Security
incident-response, information-security
Smishing
Huntress Cybersecurity

Smishing

Phishing
Tradecraft
Social Engineering
phishing, tradecraft, social-engineering
Phishing Defense
Huntress Cybersecurity

Phishing Defense

Phishing
Core Concepts
phishing, core-concepts
Intro to Cybersecurity
Huntress Cybersecurity

Intro to Cybersecurity

Core Concepts
core-concepts
Passwords
Huntress Cybersecurity

Passwords

Passwords
Core Concepts
passwords, core-concepts
Password Manager
Huntress Cybersecurity

Password Manager

Passwords
Information Security
passwords, information-security
Payment Card Industry (PCI) Compliance
Huntress Cybersecurity

Payment Card Industry (PCI) Compliance

Compliance Training
compliance-training
Wi-Fi and VPNs
Huntress Cybersecurity

Wi-Fi and VPNs

Core Concepts
Information Security
core-concepts, information-security
Physical Security
Huntress Cybersecurity

Physical Security

Core Concepts
core-concepts
Social Media
Huntress Cybersecurity

Social Media

Phishing
Social Engineering
Core Concepts
phishing, social-engineering, core-concepts
Social Engineering
Huntress Cybersecurity

Social Engineering

Social Engineering
Phishing
Tradecraft
social-engineering, phishing, tradecraft
Secure Browsing
Huntress Cybersecurity

Secure Browsing

Phishing
Information Security
phishing, information-security
Archie Stevens (Mayor of Sludge Springs)
Archie Stevens (Mayor of Sludge Springs)
,
Professor Wade
Professor Wade
,
Janel
Janel
,
Oliver
Oliver
,
Ricky the Rocket
Ricky the Rocket
,
Lynn
Lynn
,
Liam
Liam
,
The Major
The Major
,
Marge
Marge
,
Larry
Larry
,
Gwen
Gwen
,
Debbie
Debbie
,
The All Seeing Three: Mabel, Ethel, Rose
The All Seeing Three: Mabel, Ethel, Rose
,
Shauna
Shauna
,
Chuck
Chuck
,
Stacey
Stacey
,
Aubrey
Aubrey
,
Miss Powers
Miss Powers
,
Erwin
Erwin
,
Texas Teddy
Texas Teddy
,
Jasmine
Jasmine
,
Bob
Bob
,
Bot-head
Bot-head
,
Imani
Imani
,
Sloth
Sloth
,
Sheep
Sheep
,
Rhino
Rhino
,
Pecan Man
Pecan Man
,
Orzo
Orzo
,
Julius
Julius
,
Bernie
Bernie
,
Noah
Noah
,
Kristin
Kristin
,
Harper
Harper
,
Christopher
Christopher
,
Brent G.
Brent G.
,
Joshhh
Joshhh
,
Brock
Brock
,
Ali
Ali
,
Phil
Phil
,
Brute Force
Brute Force
,
Peter
Peter
,
Hal
Hal
,
Tom
Tom
,
Don
Don
,
Todd
Todd
,
Susan Salamander
Susan Salamander
,
Craig
Craig
,
Hank
Hank
,
Billy
Billy
,
Barbara
Barbara
,
Frank
Frank
,
Arthur
Arthur
,
Matt
Matt
,
Benson
Benson
,
Michelle
Michelle
,
Heather
Heather
,
Dr. Cookay
Dr. Cookay
,
Passmaster
Passmaster
,
Paige
Paige
,
Bryson Bee
Bryson Bee
,
Professor Bogusat
Professor Bogusat
,
Marcello
Marcello
,
Phillipe
Phillipe
,
Cork
Cork
,
Brooke
Brooke
,
Toucan Man
Toucan Man
,
Eli
Eli
,
Skorms
Skorms
,
DeeDee
DeeDee
,
Quincy
Quincy
,
Weasley
Weasley
,
Joe Cannoli
Joe Cannoli
,
Moe Cannoli
Moe Cannoli
,
Tradecraft
Tradecraft
Core Concepts
Core Concepts
Artificial Intelligence
Artificial Intelligence
Incident Response & Reporting
Incident Response & Reporting
Social Engineering
Social Engineering
Passwords
Passwords
Information Security
Information Security
Privacy
Privacy
Compliance Training
Compliance Training
Phishing
Phishing
Glitch effectGlitch effectBlue ellipse

Provide an Impactful SAT Experience

Don’t just check a compliance box. Elevate your workplace’s security culture while giving your employees an enjoyable experience.

Try Huntress SAT for Free
security culture illustration