You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-office-365/attack-simulation-training-training-modules.md
+18-5Lines changed: 18 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.collection:
12
12
- tier2
13
13
description: Admins can learn about the Training modules that are available to use in Training campaigns in Attack simulation training in Microsoft Defender for Office 365 Plan 2.
14
14
search.appverid: met150
15
-
ms.date: 08/14/2024
15
+
ms.date: 06/30/2025
16
16
appliesto:
17
17
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
18
18
---
@@ -25,11 +25,24 @@ In Attack simulation training in Microsoft 365 E5 or Microsoft Defender for Offi
25
25
26
26
To see the available Training modules, open the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration**\>**Attack simulation training**\>**Content library** tab \> and then select **Training modules**. Or, to go directly to the **Content library** tab where you can select **Training modules**, use <https://security.microsoft.com/attacksimulator?viewid=contentlibrary>.
27
27
28
-
> [!TIP]
29
-
> The following training modules for QR codes are available:
28
+
> [!NOTE]
29
+
>
30
+
> - The following training modules for QR codes are available:
31
+
> - Malicious digital QR codes
32
+
> - Malicious printed QR codes
30
33
>
31
-
> -**Malicious digital QR codes**
32
-
> -**Malicious printed QR codes**
34
+
> - The following modules will be retired from the training catalog. Avoid assigning the following trainings in new training campaigns:
35
+
> - Security Essentials for IT Administrators 01: Introduction and Overview
36
+
> - Security Essentials for IT Administrators 02: Core Principles of Cyber Security
37
+
> - Security Essentials for IT Administrators 03: Security Program Management
38
+
> - Security Essentials for IT Administrators 04: Security Maintenance and Hygiene
39
+
> - Security Essentials for IT Administrators 05: Authentication and Authorization
40
+
> - Security Essentials for IT Administrators 06: Data Protection
41
+
> - Security Essentials for IT Administrators 07: Sample Attacks
42
+
> - Security Essentials for IT Administrators 08: Attack Scenario
43
+
> - Security Essentials for IT Administrators 10: Securing Cloud Computing Environments
44
+
> - Security Essentials for IT Administrators 11: Securing Web Servers
45
+
> - Security Essentials for IT Administrators 12: Attack Case Study, Supply Chain Attacks
33
46
34
47
The **Training modules** page shows the following information for each module. You can sort the modules by clicking on an available column header. Select :::image type="icon" source="media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns** to change the columns that are shown. By default, all available columns are selected.
0 commit comments