ĢTV

Glitch effectGlitch effectGlitch effect

ĢTV Security Awareness
Training Episodes

Explore the world of Currivulaville through our ĢTV Security Awareness Training
episode library. Learn about cybersecurity by taking a journey with heroes, villains, and stories—
all designed to make employees smarter with their cybersecurity decisions.

Glitch effectBlue ellipse
Topic
Down arrow
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Glitch effect
Teal gradient Glitch effect
Showing
Showing
of
Showing
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Ransomware II
ĢTV Cybersecurity

Ransomware II

Ransomware
Phishing
Insider Threat
ĢTV Cybersecurity

Insider Threat

Insider Threat
Data Protection
Spear Phishing
ĢTV Cybersecurity

Spear Phishing

Phishing
Suspicious Events
ĢTV Cybersecurity

Suspicious Events

Social Engineering
Incident Reporting
Malvertising
ĢTV Cybersecurity

Malvertising

Malvertising
Social Engineering
Email Compromise (BEC) II
ĢTV Cybersecurity

Email Compromise (BEC) II

Business Email Compromise
Phishing
Generative Artificial Intelligence (AI)
ĢTV Cybersecurity

Generative Artificial Intelligence (AI)

Information Security
Artificial Intelligence
Storing Passwords
ĢTV Cybersecurity

Storing Passwords

Passwords
HIPAA
ĢTV Cybersecurity

HIPAA

HIPAA
Compliance
Adversary In The Middle (AiTM)
ĢTV Cybersecurity

Adversary In The Middle (AiTM)

Phishing
Adversary in the Middle (AiTM)
phishing
Remote Work
ĢTV Cybersecurity

Remote Work

Shoulder Surfing
Locking Devices
Public Wifi
Securing Devices
shoulder-surfing, locking-devices, public-wifi, securing-devices
Locking Devices
ĢTV Cybersecurity

Locking Devices

Locking Devices
Physical Access
locking-devices
Clean Desk
ĢTV Cybersecurity

Clean Desk

Clean Desk
Physical Access
clean-desk, physical access
Phishing
ĢTV Cybersecurity

Phishing

Phishing
Clean Desk
phishing, clean-desk
GDPR
ĢTV Cybersecurity

GDPR

GDPR
Compliance Training
gdpr
NERC CIP
ĢTV Cybersecurity

NERC CIP

NERC CIP
Compliance Training
nerc-cip, compliance-training
SOC 2
ĢTV Cybersecurity

SOC 2

SOC 2
Compliance Training
soc-2
Confidential Info
ĢTV Cybersecurity

Confidential Info

Confidentiality
Secure Information Storage
confidential-info
Malware Attacks
ĢTV Cybersecurity

Malware Attacks

Malware
Phishing
malware
Password Reuse
ĢTV Cybersecurity

Password Reuse

Password Reuse
Passwords
password-reuse
Removable Media
ĢTV Cybersecurity

Removable Media

Removable Media
Malware
removeable-media
Multi-Factor Authentication (MFA)
ĢTV Cybersecurity

Multi-Factor Authentication (MFA)

Multi-Factor
multi-factor
Mobile Devices
ĢTV Cybersecurity

Mobile Devices

Mobile Devices
mobile-devices
Privacy
ĢTV Cybersecurity

Privacy

Privacy
Data Privacy
privacy
Email Compromise (BEC)
ĢTV Cybersecurity

Email Compromise (BEC)

Business Email Compromise
business-email-compromise
Information Security
ĢTV Cybersecurity

Information Security

Information Security
Access Controls
information-security, access-controls
Gift Card Scam
ĢTV Cybersecurity

Gift Card Scam

Gift Card Scam
Phishing
gift-card-scam
Ransomware
ĢTV Cybersecurity

Ransomware

Ransomware
Malware
ransomware
Incident Response
ĢTV Cybersecurity

Incident Response

Incident Response
Backup & Recovery
incident-response
Smishing
ĢTV Cybersecurity

Smishing

Smishing
Phishing
smishing
Phishing Defense
ĢTV Cybersecurity

Phishing Defense

Phishing
Phishing Defense
phishing, phishing-defense
Intro to Cybersecurity
ĢTV Cybersecurity

Intro to Cybersecurity

Intro to Cybersecurity
intro-to-cybersecurity
Passwords
ĢTV Cybersecurity

Passwords

Passwords
Password Reuse
passwords
Password Manager
ĢTV Cybersecurity

Password Manager

Passwords
passwords, password-manager
Payment Card Industry (PCI) Compliance
ĢTV Cybersecurity

Payment Card Industry (PCI) Compliance

Compliance Training
PCI
compliance-training, pci
Wi-Fi and VPNs
ĢTV Cybersecurity

Wi-Fi and VPNs

Wifi
VPN
wifi
Physical Security
ĢTV Cybersecurity

Physical Security

Physical Security
Access Controls
Social Media
ĢTV Cybersecurity

Social Media

Social Media
Social Engineering
Social Engineering
ĢTV Cybersecurity

Social Engineering

Social Engineering
Phishing
social-engineering
Secure Browsing
ĢTV Cybersecurity

Secure Browsing

Secure Browsing
Phishing
secure-browsing
Oliver
Oliver
,
Ricky the Rocket
Ricky the Rocket
,
Lynn
Lynn
,
Liam
Liam
,
The Major
The Major
,
Marge
Marge
,
Larry
Larry
,
Gwen
Gwen
,
Debbie
Debbie
,
The All Seeing Three: Mabel, Ethel, Rose
The All Seeing Three: Mabel, Ethel, Rose
,
Shawna
Shawna
,
Chuck
Chuck
,
Stacey
Stacey
,
Aubrey
Aubrey
,
Miss Powers
Miss Powers
,
Erwin
Erwin
,
(Texas) Teddy
(Texas) Teddy
,
Jasmine
Jasmine
,
Bob
Bob
,
Bot-head
Bot-head
,
Imani
Imani
,
Sloth
Sloth
,
Sheep
Sheep
,
Rhino
Rhino
,
Pecan Man
Pecan Man
,
Orzo
Orzo
,
Julius
Julius
,
Bernie
Bernie
,
Noah
Noah
,
Kristin
Kristin
,
Harper
Harper
,
Christopher
Christopher
,
Brent G.
Brent G.
,
Joshhh
Joshhh
,
Brock
Brock
,
Ali
Ali
,
Phil
Phil
,
Brute Force
Brute Force
,
Peter
Peter
,
Hal
Hal
,
Tom
Tom
,
Don
Don
,
Todd
Todd
,
Susan Salamander
Susan Salamander
,
Craig
Craig
,
Hank
Hank
,
Billy
Billy
,
Barbara
Barbara
,
Frank
Frank
,
Arthur
Arthur
,
Matt
Matt
,
Benson
Benson
,
Michelle
Michelle
,
Heather
Heather
,
Dr. Cookay
Dr. Cookay
,
Passmaster
Passmaster
,
Paige
Paige
,
Bryson Bee
Bryson Bee
,
Professor Bogusat
Professor Bogusat
,
Marcello
Marcello
,
Phillipe
Phillipe
,
Cork
Cork
,
Brooke
Brooke
,
Toucan Man
Toucan Man
,
Eli
Eli
,
Skorms
Skorms
,
DeeDee
DeeDee
,
Quincy
Quincy
,
Weasley
Weasley
,
Joe Cannoli
Joe Cannoli
,
Moe Cannoli
Moe Cannoli
,
Compliance
Compliance
HIPAA
HIPAA
Artificial Intelligence
Artificial Intelligence
Malvertising
Malvertising
Incident Reporting
Incident Reporting
Insider Threat
Insider Threat
Data Protection
Data Protection
Adversary in the Middle (AiTM)
Adversary in the Middle (AiTM)
Secure Information Storage
Secure Information Storage
Confidentiality
Confidentiality
Data Privacy
Data Privacy
Core Concept
Core Concept
Cybersecurity
Cybersecurity
VPN
VPN
Removable Media
Removable Media
Access Controls
Access Controls
Backup & Recovery
Backup & Recovery
Physical Access
Physical Access
AiTM
AiTM
Securing Devices
Securing Devices
Public Wifi
Public Wifi
Locking Devices
Locking Devices
Shoulder Surfing
Shoulder Surfing
Secure Browsing
Secure Browsing
Social Engineering
Social Engineering
Social Media
Social Media
Physical Security
Physical Security
Wifi
Wifi
Password Manager
Password Manager
Phishing Defense
Phishing Defense
PCI
PCI
Intro to Cybersecurity
Intro to Cybersecurity
Passwords
Passwords
Locking Devices
Locking Devices
Smishing
Smishing
Incident Response
Incident Response
Ransomware
Ransomware
Gift Card Scam
Gift Card Scam
Information Security
Information Security
Business Email Compromise
Business Email Compromise
Privacy
Privacy
Mobile Devices
Mobile Devices
Multi-Factor
Multi-Factor
Removeable Media
Removeable Media
Password Reuse
Password Reuse
Malware
Malware
Confidential Info
Confidential Info
SOC 2
SOC 2
Compliance Training
Compliance Training
NERC CIP
NERC CIP
GDPR
GDPR
Phishing
Phishing
Clean Desk
Clean Desk
Glitch effectGlitch effectBlue ellipse

Provide an Impactful SAT Experience

Don’t just check a compliance box. Elevate your workplace’s security culture while giving your employees an enjoyable experience.

Try ĢTV SAT for Free
security culture illustration