Glitch effectGlitch effectGlitch effect

Huntress Security Awareness
Training Episodes

Explore the world of Currivulaville through our Huntress Security Awareness Training
episode library. Learn about cybersecurity by taking a journey with heroes, villains, and stories—
all designed to make employees smarter with their cybersecurity decisions.

Glitch effectBlue ellipse
Topic
Down arrow
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Glitch effect
Teal gradient Glitch effect
Showing
Showing
of
Showing
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Huntress Cybersecurity
Shoulder Surfing
Locking Devices
Public Wifi
Securing Devices

Remote Work

shoulder-surfing, locking-devices, public-wifi, securing-devices
Huntress Cybersecurity
Locking Devices

Studio Tour Troubles

locking-devices
Huntress Cybersecurity
Clean Desk

The Great Rollercoaster Robbery

clean-desk
Huntress Cybersecurity
Phishing
Clean Desk

The Final Scoop

phishing, clean-desk
Huntress Cybersecurity
GDPR

GDPR

gdpr
Huntress Cybersecurity
NERC CIP
Compliance Training

NERC CIP

nerc-cip, compliance-training
Huntress Cybersecurity
SOC 2

SOC 2

soc-2
Huntress Cybersecurity
Confidential Info

The Reckoning

confidential-info
Huntress Cybersecurity
Malware

Viral Encounters of the Third Kind

malware
Huntress Cybersecurity
Password Reuse

One of a Kind

password-reuse
Huntress Cybersecurity
Removeable Media

21 Jump Drive

removeable-media
Huntress Cybersecurity
Multi-Factor

Super Multi-Factor Breakthrough

multi-factor
Huntress Cybersecurity
Mobile Devices

Downward-Facing Bank Account

mobile-devices
Huntress Cybersecurity
Privacy

A BopTalk Carol

privacy
Huntress Cybersecurity
Business Email Compromise

Jelly Flop

business-email-compromise
Huntress Cybersecurity
Information Security

Haters Gonna Hover

information-security
Huntress Cybersecurity
Gift Card Scam

First Day Fiasco

gift-card-scam
Huntress Cybersecurity
Ransomware

Cookie Crushed

ransomware
Huntress Cybersecurity
Incident Response

We Saved a Zoo

incident-response
Huntress Cybersecurity
Smishing

Roses and Ruins

smishing
Huntress Cybersecurity
Phishing
Phishing Defense

Phishing Defense

phishing, phishing-defense
Huntress Cybersecurity
Intro to Cybersecurity

Intro to Cybersecurity

intro-to-cybersecurity
Huntress Cybersecurity
Passwords

The Password Kid

passwords
Huntress Cybersecurity
Passwords
Password Manager

Plenty of Passwords

passwords, password-manager
Huntress Cybersecurity
Compliance Training
PCI

PCI

compliance-training, pci
Huntress Cybersecurity
Wifi

Wifi in Paradise Wifi

wifi
Huntress Cybersecurity
Physical Security

Weasley Impossible

Huntress Cybersecurity
Social Media

Weapons of Social Media Destruction

Huntress Cybersecurity
Social Engineering

Singing for a Phish

social-engineering
Huntress Cybersecurity
Secure Browsing

Enter the Simulation

secure-browsing
Imani
Imani
,
Sloth
Sloth
,
Sheep
Sheep
,
Rhino
Rhino
,
Pecan Man
Pecan Man
,
Orzo
Orzo
,
Julius
Julius
,
Bernie
Bernie
,
Noah
Noah
,
Kristin
Kristin
,
Harper
Harper
,
Christopher
Christopher
,
Brent G.
Brent G.
,
Joshhh
Joshhh
,
Brock
Brock
,
Ali
Ali
,
Phil
Phil
,
Brute Force
Brute Force
,
Peter
Peter
,
Hal
Hal
,
Tom
Tom
,
Don
Don
,
Todd
Todd
,
Susan Salamander
Susan Salamander
,
Craig
Craig
,
Hank
Hank
,
Billy
Billy
,
Barbara
Barbara
,
Frank
Frank
,
Arthur
Arthur
,
Matt
Matt
,
Benson
Benson
,
Michelle
Michelle
,
Heather
Heather
,
Dr. Cookay
Dr. Cookay
,
Passmaster
Passmaster
,
Paige
Paige
,
Bryson Bee
Bryson Bee
,
Professor Bogusat
Professor Bogusat
,
Marcello
Marcello
,
Phillipe
Phillipe
,
Cork
Cork
,
Brooke
Brooke
,
Toucan Man
Toucan Man
,
Eli
Eli
,
Skorms
Skorms
,
DeeDee
DeeDee
,
Quincy
Quincy
,
Weasley
Weasley
,
Joe Cannoli
Joe Cannoli
,
Moe Cannoli
Moe Cannoli
,
Securing Devices
Securing Devices
Public Wifi
Public Wifi
Locking Devices
Locking Devices
Shoulder Surfing
Shoulder Surfing
Secure Browsing
Secure Browsing
Social Engineering
Social Engineering
Social Media
Social Media
Physical Security
Physical Security
Wifi
Wifi
Password Manager
Password Manager
Phishing Defense
Phishing Defense
PCI
PCI
Intro to Cybersecurity
Intro to Cybersecurity
Passwords
Passwords
Locking Devices
Locking Devices
Smishing
Smishing
Incident Response
Incident Response
Ransomware
Ransomware
Gift Card Scam
Gift Card Scam
Information Security
Information Security
Business Email Compromise
Business Email Compromise
Privacy
Privacy
Mobile Devices
Mobile Devices
Multi-Factor
Multi-Factor
Removeable Media
Removeable Media
Password Reuse
Password Reuse
Malware
Malware
Confidential Info
Confidential Info
SOC 2
SOC 2
Compliance Training
Compliance Training
NERC CIP
NERC CIP
GDPR
GDPR
Phishing
Phishing
Clean Desk
Clean Desk
Glitch effectGlitch effectBlue ellipse

Provide an Impactful SAT Experience

Don’t just check a compliance box. Elevate your workplace’s security culture while giving your employees an enjoyable experience.

Try Huntress SAT for Free
security culture illustration