Skip to content

Commit 44395c4

Browse files
authored
Merge pull request #4374 from VipulMSFT/patch-18
Update attack-simulation-training-training-modules.md
2 parents 7d4d079 + 7c2c6b4 commit 44395c4

File tree

1 file changed

+18
-5
lines changed

1 file changed

+18
-5
lines changed

defender-office-365/attack-simulation-training-training-modules.md

Lines changed: 18 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- tier2
1313
description: Admins can learn about the Training modules that are available to use in Training campaigns in Attack simulation training in Microsoft Defender for Office 365 Plan 2.
1414
search.appverid: met150
15-
ms.date: 08/14/2024
15+
ms.date: 06/30/2025
1616
appliesto:
1717
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
1818
---
@@ -25,11 +25,24 @@ In Attack simulation training in Microsoft 365 E5 or Microsoft Defender for Offi
2525

2626
To see the available Training modules, open the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Attack simulation training** \> **Content library** tab \> and then select **Training modules**. Or, to go directly to the **Content library** tab where you can select **Training modules**, use <https://security.microsoft.com/attacksimulator?viewid=contentlibrary>.
2727

28-
> [!TIP]
29-
> The following training modules for QR codes are available:
28+
> [!NOTE]
29+
>
30+
> - The following training modules for QR codes are available:
31+
> - Malicious digital QR codes
32+
> - Malicious printed QR codes
3033
>
31-
> - **Malicious digital QR codes**
32-
> - **Malicious printed QR codes**
34+
> - The following modules will be retired from the training catalog. Avoid assigning the following trainings in new training campaigns:
35+
> - Security Essentials for IT Administrators 01: Introduction and Overview
36+
> - Security Essentials for IT Administrators 02: Core Principles of Cyber Security
37+
> - Security Essentials for IT Administrators 03: Security Program Management
38+
> - Security Essentials for IT Administrators 04: Security Maintenance and Hygiene
39+
> - Security Essentials for IT Administrators 05: Authentication and Authorization
40+
> - Security Essentials for IT Administrators 06: Data Protection
41+
> - Security Essentials for IT Administrators 07: Sample Attacks
42+
> - Security Essentials for IT Administrators 08: Attack Scenario
43+
> - Security Essentials for IT Administrators 10: Securing Cloud Computing Environments
44+
> - Security Essentials for IT Administrators 11: Securing Web Servers
45+
> - Security Essentials for IT Administrators 12: Attack Case Study, Supply Chain Attacks
3346
3447
The **Training modules** page shows the following information for each module. You can sort the modules by clicking on an available column header. Select :::image type="icon" source="media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns** to change the columns that are shown. By default, all available columns are selected.
3548

0 commit comments

Comments
 (0)