Explore the world of Currivulaville through our Huntress Security Awareness Training episode library. Learn about cybersecurity by taking a journey with heroes, villains, and stories— all designed to make employees smarter with their cybersecurity decisions.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Shoulder Surfing
Locking Devices
Public Wifi
Securing Devices
Remote Work
Remote Work
Imani is taking a much needed vacation, but when someone catches wind of a big deal her company is working on, will she be able to protect the incredibly valuable details while working remotely?
CCB Studios has a new tour group today. Watch how a quick bathroom break might turn into a Hal’s biggest mistake.
Characters in this episode:
eli, hal, toucan-man
locking-devices
locking-devices
Clean Desk
The Great Rollercoaster Robbery
The Great Rollercoaster Robbery
Cannoli Brothers Construction has the opportunity of a lifetime to pitch an exciting new theme park, Super Space City. but you never know what length someone would go to undercut the bid and steal their ideas.
Moo Moo’s, a popular ice cream company, becomes a target when they can’t meet the demands of a little 5-year old girl named DeeDee. She’ll find any way possible to make sure she gets her revenge against Moo Moos.
Characters in this episode:
deedee, moe-cannoli, rebecca
phishing, clean-desk
phishing, clean-desk
GDPR
GDPR
GDPR
Learn about the different requirements and concepts behind the GDPR regulation. As data continues to flow to different locations in or outside the European Union, everyone play a role in protecting that data.
Characters in this episode:
gdpr
gdpr
NERC CIP
Compliance Training
NERC CIP
NERC CIP
Learn the basic principals of the NERC CIP compliance framework dedicated to helping protect the North American power grid from cyber attacks. Enjoy a visual representation of complex regulatory standards broken down into easy to understand concepts.
Characters in this episode:
nerc-cip, compliance-training
nerc-cip, compliance-training
SOC 2
SOC 2
SOC 2
The SKORMS love ordering various items from Earth, but they hate when their packages don’t make it to them. Follow the journey on how SOC 2 helped save and industry struggling to stay secure and protect their customer’s data.
Characters in this episode:
skorms, dirty-mike
soc-2
soc-2
Confidential Info
The Reckoning
The Reckoning
Ernest is working on marketing materials for Toucan Man III, when his son Eli discovers the script for the upcoming film about his favorite super hero. Will Eli's actions be the only chance to save his hero and give the world a chance to fight another day?
Characters in this episode:
eli, ernest, toucan-man
confidential-info
confidential-info
Malware
Viral Encounters of the Third Kind
Viral Encounters of the Third Kind
A mysterious email infects utility companies all over the world with a nasty virus. Who is the hacker behind this attack and more importantly, will the quick-thinking malware analyst Brooke be able to stop it?
Characters in this episode:
brooke, cork
malware
malware
Password Reuse
One of a Kind
One of a Kind
Phillipe, the art curator for the Don Abbrucci gallery, is auctioning off a stunning new painting, The Creation of Sloth. Watch why Phillipe’s choice to reuse his passwords becomes a hacker’s masterpiece.
Characters in this episode:
phillipe, marcello
password-reuse
password-reuse
Removeable Media
21 Jump Drive
21 Jump Drive
Professor Bogusat finds an ordinary looking flash drive lying around Bryson University campus. But an innocent look through its content, might lead Bryson down a dark and gloomy future.
Characters in this episode:
professor-bogusat, bryson-bee, toby
removeable-media
removeable-media
Multi-Factor
Super Multi-Factor Breakthrough
Super Multi-Factor Breakthrough
Paige loves playing games, but security has never been on her mind. Follow Paige on her journey to leveling-up her cyber defenses.
Characters in this episode:
deedee, paige, pass-master, dr-cookay
multi-factor
multi-factor
Mobile Devices
Downward-Facing Bank Account
Downward-Facing Bank Account
When Heather enters a room, everyone knows it. While she doesn’t seem to care much about annoying others, she's about to experience one of the most annoying days of her life.
Characters in this episode:
heather, michelle, benson
mobile-devices
mobile-devices
Privacy
A BopTalk Carol
A BopTalk Carol
Twas the night before Christmas and inside the office, BopTalk founder Matt is warned to be cautious! A spiritual mentor shows Matt his present, future, and past. Will the choice to sell user data end up being his last?
Characters in this episode:
matt, arthur
privacy
privacy
Business Email Compromise
Jelly Flop
Jelly Flop
Frank’s Famous PB&J; just closed a huge deal with Roaster’s Peanut Butter! Everything seems to be going great until Frank makes the biggest mistake on his trip back to headquarters. Will Frank’s business make it, or will his situation get a little nutty?
Characters in this episode:
frank, kurt, barbara
business-email-compromise
business-email-compromise
Information Security
Haters Gonna Hover
Haters Gonna Hover
Billy begins his internship at Mom and Pop’s Hover Labs. But his life is about to change when his friends start asking what he’s working on.
Characters in this episode:
billy, hank, quincy
information-security
information-security
Gift Card Scam
First Day Fiasco
First Day Fiasco
It’s Craig’s first day as an office manager at Balloon Marketing when a quick email from his boss changes everything. Will Craig’s first day be his last?
Characters in this episode:
craig, susan-salamander, todd
gift-card-scam
gift-card-scam
Ransomware
Cookie Crushed
Cookie Crushed
Cookie Crush is the hottest new game that everyone is downloading, but it might be more dangerous than it seems. Will Dr. Cookay’s latest scheme pay off, or will Adam the IT Manager have his cookies get crumbled?
Characters in this episode:
dr-cookay, adam
ransomware
ransomware
Incident Response
We Saved a Zoo
We Saved a Zoo
Accidents always seem to happen at the perfect time. Watch as the beloved Van Saun Zoo encounters a cyber attack, it’s up to night shift hero Don to save the animals. Now if only he remembered where they keep the incident response plan…
Characters in this episode:
don, tom
incident-response
incident-response
Smishing
Roses and Ruins
Roses and Ruins
It's almost Valentines day, Steph's busiest day of the year for selling flowers! When Steph gets a text asking her to update her banking information, she doesn't think twice about it. Things might not be so rosy tomorrow when she finds out not everyone's heart is in the right place.
Characters in this episode:
joey-broke, steph
smishing
smishing
Phishing
Phishing Defense
Phishing Defense
Phishing Defense
Learn how to defend against phishing and social engineering attacks. Understand a variety of defense tactics and techniques to keep the hackers away.
Characters in this episode:
deedee
phishing, phishing-defense
phishing, phishing-defense
Intro to Cybersecurity
Intro to Cybersecurity
Intro to Cybersecurity
Learn some of the basic principals that every person needs to know on how to defend themselves against cyber attacks including: passwords, multi-factor authentication, phishing, and much more.
Characters in this episode:
deedee
intro-to-cybersecurity
intro-to-cybersecurity
Passwords
The Password Kid
The Password Kid
Peter is transported to the digital world to learn from the wise PassMaster. Will Peter’s new training unlock the skills to create a password strong enough to stop the hackers?
Characters in this episode:
pass-master, peter, brute-force
passwords
passwords
Passwords
Password Manager
Plenty of Passwords
Plenty of Passwords
Learn the basic principals of why password managers are a critical tool to safely secure and manage your passwords.
Characters in this episode:
paige
passwords, password-manager
passwords, password-manager
Compliance Training
PCI
PCI
PCI
Learn more about PCI compliance and the security framework designed to protect cardholder data.
Characters in this episode:
compliance-training, pci
compliance-training, pci
Wifi
Wifi in Paradise Wifi
Wifi in Paradise Wifi
Phil’s vacation quickly becomes a miserable experience when Tom keeps getting in his way. You never know what someone would be willing to do for peace and quiet… and their tropical umbrella drink.
Characters in this episode:
tom, don, phil
wifi
wifi
Physical Security
Weasley Impossible
Weasley Impossible
Weasley has his eye on Gigantic Mutual Bank, but he needs a plan if he wants to steal all their money. Will Weasley figure out how to break in? Or will his mission fail miserably like everything else he’s ever done?
Characters in this episode:
weasley, ali, todd, brock
Social Media
Weapons of Social Media Destruction
Weapons of Social Media Destruction
It’s easy to become anyone in the world of social media. DeeDee won't let anything get between her and her popstar idol, Joshhh. Find out just how far DeeDee will go just to be in the same room as her crush.
Characters in this episode:
deedee, joshhh, brent-g
Social Engineering
Singing for a Phish
Singing for a Phish
Joshhh is on tour and tickets are completely sold out. Will DeeDee destroy her friendship for the chance to see Joshhh in person?
Characters in this episode:
deedee, christopher, harper
social-engineering
social-engineering
Secure Browsing
Enter the Simulation
Enter the Simulation
Kristin is ready for another boring training session about secure Internet browsing. Follow her adventure as she explores the dark side of the Internet using Noah’s hi-tech Browser Simulator.