Glitch effectGlitch effectGlitch effect

Huntress Security Awareness
Training Episodes

Explore the world of Currivulaville through our Huntress Security Awareness Training
episode library. Learn about cybersecurity by taking a journey with heroes, villains, and stories—
all designed to make employees smarter with their cybersecurity decisions.

Glitch effectBlue ellipse
Topic
Down arrow
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Glitch effect
Teal gradient Glitch effect
Showing
Showing
of
Showing
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Adversary in the Middle
Huntress Cybersecurity
Phishing

Adversary in the Middle

phishing
Remote Work
Huntress Cybersecurity
Shoulder Surfing
Locking Devices
Public Wifi
Securing Devices

Remote Work

shoulder-surfing, locking-devices, public-wifi, securing-devices
Studio Tour Troubles
Huntress Cybersecurity
Locking Devices

Studio Tour Troubles

locking-devices
The Great Rollercoaster Robbery
Huntress Cybersecurity
Clean Desk

The Great Rollercoaster Robbery

clean-desk
The Final Scoop
Huntress Cybersecurity
Phishing
Clean Desk

The Final Scoop

phishing, clean-desk
GDPR
Huntress Cybersecurity
GDPR

GDPR

gdpr
NERC CIP
Huntress Cybersecurity
NERC CIP
Compliance Training

NERC CIP

nerc-cip, compliance-training
SOC 2
Huntress Cybersecurity
SOC 2

SOC 2

soc-2
The Reckoning
Huntress Cybersecurity
Confidential Info

The Reckoning

confidential-info
Viral Encounters of the Third Kind
Huntress Cybersecurity
Malware

Viral Encounters of the Third Kind

malware
One of a Kind
Huntress Cybersecurity
Password Reuse

One of a Kind

password-reuse
21 Jump Drive
Huntress Cybersecurity
Removeable Media

21 Jump Drive

removeable-media
Super Multi-Factor Breakthrough
Huntress Cybersecurity
Multi-Factor

Super Multi-Factor Breakthrough

multi-factor
Downward-Facing Bank Account
Huntress Cybersecurity
Mobile Devices

Downward-Facing Bank Account

mobile-devices
A BopTalk Carol
Huntress Cybersecurity
Privacy

A BopTalk Carol

privacy
Jelly Flop
Huntress Cybersecurity
Business Email Compromise

Jelly Flop

business-email-compromise
Haters Gonna Hover
Huntress Cybersecurity
Information Security

Haters Gonna Hover

information-security
First Day Fiasco
Huntress Cybersecurity
Gift Card Scam

First Day Fiasco

gift-card-scam
Cookie Crushed
Huntress Cybersecurity
Ransomware

Cookie Crushed

ransomware
We Saved a Zoo
Huntress Cybersecurity
Incident Response

We Saved a Zoo

incident-response
Roses and Ruins
Huntress Cybersecurity
Smishing

Roses and Ruins

smishing
Phishing Defense
Huntress Cybersecurity
Phishing
Phishing Defense

Phishing Defense

phishing, phishing-defense
Intro to Cybersecurity
Huntress Cybersecurity
Intro to Cybersecurity

Intro to Cybersecurity

intro-to-cybersecurity
The Password Kid
Huntress Cybersecurity
Passwords

The Password Kid

passwords
Plenty of Passwords
Huntress Cybersecurity
Passwords
Password Manager

Plenty of Passwords

passwords, password-manager
PCI
Huntress Cybersecurity
Compliance Training
PCI

PCI

compliance-training, pci
Wifi in Paradise Wifi
Huntress Cybersecurity
Wifi

Wifi in Paradise Wifi

wifi
Weasley Impossible
Huntress Cybersecurity
Physical Security

Weasley Impossible

Weapons of Social Media Destruction
Huntress Cybersecurity
Social Media

Weapons of Social Media Destruction

Singing for a Phish
Huntress Cybersecurity
Social Engineering

Singing for a Phish

social-engineering
Enter the Simulation
Huntress Cybersecurity
Secure Browsing

Enter the Simulation

secure-browsing
Bot-head
Bot-head
,
Imani
Imani
,
Sloth
Sloth
,
Sheep
Sheep
,
Rhino
Rhino
,
Pecan Man
Pecan Man
,
Orzo
Orzo
,
Julius
Julius
,
Bernie
Bernie
,
Noah
Noah
,
Kristin
Kristin
,
Harper
Harper
,
Christopher
Christopher
,
Brent G.
Brent G.
,
Joshhh
Joshhh
,
Brock
Brock
,
Ali
Ali
,
Phil
Phil
,
Brute Force
Brute Force
,
Peter
Peter
,
Hal
Hal
,
Tom
Tom
,
Don
Don
,
Todd
Todd
,
Susan Salamander
Susan Salamander
,
Craig
Craig
,
Hank
Hank
,
Billy
Billy
,
Barbara
Barbara
,
Frank
Frank
,
Arthur
Arthur
,
Matt
Matt
,
Benson
Benson
,
Michelle
Michelle
,
Heather
Heather
,
Dr. Cookay
Dr. Cookay
,
Passmaster
Passmaster
,
Paige
Paige
,
Bryson Bee
Bryson Bee
,
Professor Bogusat
Professor Bogusat
,
Marcello
Marcello
,
Phillipe
Phillipe
,
Cork
Cork
,
Brooke
Brooke
,
Toucan Man
Toucan Man
,
Eli
Eli
,
Skorms
Skorms
,
DeeDee
DeeDee
,
Quincy
Quincy
,
Weasley
Weasley
,
Joe Cannoli
Joe Cannoli
,
Moe Cannoli
Moe Cannoli
,
AiTM
AiTM
Securing Devices
Securing Devices
Public Wifi
Public Wifi
Locking Devices
Locking Devices
Shoulder Surfing
Shoulder Surfing
Secure Browsing
Secure Browsing
Social Engineering
Social Engineering
Social Media
Social Media
Physical Security
Physical Security
Wifi
Wifi
Password Manager
Password Manager
Phishing Defense
Phishing Defense
PCI
PCI
Intro to Cybersecurity
Intro to Cybersecurity
Passwords
Passwords
Locking Devices
Locking Devices
Smishing
Smishing
Incident Response
Incident Response
Ransomware
Ransomware
Gift Card Scam
Gift Card Scam
Information Security
Information Security
Business Email Compromise
Business Email Compromise
Privacy
Privacy
Mobile Devices
Mobile Devices
Multi-Factor
Multi-Factor
Removeable Media
Removeable Media
Password Reuse
Password Reuse
Malware
Malware
Confidential Info
Confidential Info
SOC 2
SOC 2
Compliance Training
Compliance Training
NERC CIP
NERC CIP
GDPR
GDPR
Phishing
Phishing
Clean Desk
Clean Desk
Glitch effectGlitch effectBlue ellipse

Provide an Impactful SAT Experience

Don’t just check a compliance box. Elevate your workplace’s security culture while giving your employees an enjoyable experience.

Try Huntress SAT for Free
security culture illustration