Skip to content

Commit e8b43fa

Browse files
authored
Update attack-simulation-training-training-modules.md
1 parent 6ec56d3 commit e8b43fa

File tree

1 file changed

+18
-19
lines changed

1 file changed

+18
-19
lines changed

defender-office-365/attack-simulation-training-training-modules.md

Lines changed: 18 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- tier2
1313
description: Admins can learn about the Training modules that are available to use in Training campaigns in Attack simulation training in Microsoft Defender for Office 365 Plan 2.
1414
search.appverid: met150
15-
ms.date: 08/14/2024
15+
ms.date: 06/30/2025
1616
appliesto:
1717
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
1818
---
@@ -24,26 +24,25 @@ appliesto:
2424
In Attack simulation training in Microsoft 365 E5 or Microsoft Defender for Office 365 Plan 2, you select one or more Training modules to include in Training campaigns that you create and assign to users. For more information about Training campaigns, see [Training campaigns in Attack simulation training](attack-simulation-training-training-campaigns.md).
2525

2626
To see the available Training modules, open the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Attack simulation training** \> **Content library** tab \> and then select **Training modules**. Or, to go directly to the **Content library** tab where you can select **Training modules**, use <https://security.microsoft.com/attacksimulator?viewid=contentlibrary>.
27-
> [!IMPORTANT]
28-
> The following 12 modules will be retired from the training catalog by August 20, 2025. Admins will no longer be able to assign these trainings after August 20, 2025.
29-
>
30-
> - Security Essentials for IT Administrators 01: Introduction and Overview
31-
> - Security Essentials for IT Administrators 02: Core Principles of Cyber Security
32-
> - Security Essentials for IT Administrators 03: Security Program Management
33-
> - Security Essentials for IT Administrators 04: Security Maintenance and Hygiene
34-
> - Security Essentials for IT Administrators 05: Authentication and Authorization
35-
> - Security Essentials for IT Administrators 06: Data Protection
36-
> - Security Essentials for IT Administrators 07: Sample Attacks
37-
> - Security Essentials for IT Administrators 08: Attack Scenario
38-
> - Security Essentials for IT Administrators 10: Securing Cloud Computing Environments
39-
> - Security Essentials for IT Administrators 11: Securing Web Servers
40-
> - Security Essentials for IT Administrators 12: Attack Case Study, Supply Chain Attacks
4127

42-
> [!TIP]
43-
> The following training modules for QR codes are available:
28+
> [!NOTE]
29+
>
30+
> - The following training modules for QR codes are available:
31+
> - Malicious digital QR codes
32+
> - Malicious printed QR codes
4433
>
45-
> - **Malicious digital QR codes**
46-
> - **Malicious printed QR codes**
34+
> - The following modules will be retired from the training catalog. After August 20 2025, admins can no longer assign these trainings.
35+
> - Security Essentials for IT Administrators 01: Introduction and Overview
36+
> - Security Essentials for IT Administrators 02: Core Principles of Cyber Security
37+
> - Security Essentials for IT Administrators 03: Security Program Management
38+
> - Security Essentials for IT Administrators 04: Security Maintenance and Hygiene
39+
> - Security Essentials for IT Administrators 05: Authentication and Authorization
40+
> - Security Essentials for IT Administrators 06: Data Protection
41+
> - Security Essentials for IT Administrators 07: Sample Attacks
42+
> - Security Essentials for IT Administrators 08: Attack Scenario
43+
> - Security Essentials for IT Administrators 10: Securing Cloud Computing Environments
44+
> - Security Essentials for IT Administrators 11: Securing Web Servers
45+
> - Security Essentials for IT Administrators 12: Attack Case Study, Supply Chain Attacks
4746
4847
The **Training modules** page shows the following information for each module. You can sort the modules by clicking on an available column header. Select :::image type="icon" source="media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns** to change the columns that are shown. By default, all available columns are selected.
4948

0 commit comments

Comments
 (0)