NIS-2 Training for Domain Experts
The NIS2 Directive requires security measures to be implemented during software development and maintenance and calls for fundamental training in information security. This applies not only to developers, but also to the specialist and non-technical participants involved in the software development process, such as domain experts, architects, product owners, and product managers. In this training course, this target group will learn how to comply with the requirements of the NIS2 Directive and to implement appropriate measures and activities in real-world scenarios.

At a glance
General information
- Two days of practice-based training (on-site or remote)
- Flexible training agenda with customisable focus areas
Target group
Domain experts, architects, team leads, product owners, and product managers
Application examples
Overview of security activities in accordance with the NIS2 Directive
Description
With the increasing significance of software systems for digital products comes an increase in the number of threats to which these systems are exposed. Security training for domain experts plays a decisive role in integrating security into the development process from the very beginning and minimising risks. If these issues are neglected, it often remains only a matter of time until vulnerabilities cause serious problems.
This is also being increasingly reinforced by legal and regulatory provisions such as the NIS2 Directive and the Cyber Resilience Act (CRA). These regulations increase the requirements for security activities in companies and call for the more comprehensive, consistent integration of information security. A key element here is specialist training for domain experts. Our NIS2 Training Course for Domain Experts enables companies not only to address regulatory requirements, but also to improve both security awareness within their teams and the long-term quality of the systems they develop.
In addition to ensuring compliance, this also adds long-term value to companies’ business models. After all, reputational damage (and the associated loss of trust) caused by negative reporting poses as great a risk to systems and companies as the vulnerabilities, attacks, and data losses themselves.
Our NIS2 Training Course for Domain Experts provides a fundamental overview of all the relevant phases of a secure software development process. Participants will learn how to evaluate the security of their software more effectively and to implement appropriate measures and activities in real-world scenarios. The course is based on our own experience in software development projects, which enables us to share real-life best practices.
Agenda
- Introduction to Security: Motivation and Security Goals
- Context: Compliance (NIS2, CRA, ISO27001, BSI IT Baseline Protection) and Software Security
- Secure Design: Risk Assessment, Threat Modelling, Security Requirements
- Secure Processes: Supply Chain Security, Secure Development Life Cycle
- Overview of Security in Software Development, Testing, and Operation
- Secure Products: Acceptance, Penetration Testing, Incident Management
Typical questions we answer:
- What role do domain experts play in the practical implementation of security during the development process?
- How can these people identify and assess the threats and risks to their software?
- What security requirements should be taken into account during the software development process and how can they be implemented?
- What options exist for testing and monitoring the security of software products?
- How can security activities be integrated into the agile software development life cycle, and which regulatory requirements must be taken into account?
- signed certificate of completion
- in-house training
- Customization available (agenda, tech stack, language, etc.)
- small training groups
Why inovex Academy?
Our offerThe inovex Academy has set itself the task of passing on knowledge about methods and technologies that we already use successfully in our projects.
Curated content
Our trainers create a customized training offer based on your requirements.
Customizable tech stack
In exclusive trainings, we can consider your tech stack for the training content.
Individual assistance
If needed, we can tailor the training to a specific use case of your company and work directly based on your data.
Trainers
Our trainers are field-tested experts in their areas of expertise. Through their work in projects, they expand their knowledge day by day and pass on this know-how in their trainings - application-oriented and practice-oriented.

Clemens Hübner

Dr Michael Gerhäuser
Dr. Michael Gerhäuser has been working professionally as a software developer since 2014 and joined the inovex team in 2022. He specialises in the design and implementation of web applications, both frontend and backend with operations and monitoring. He is also interested in topics such as software performance and web application security. In his private life, Michael is involved in the local software craftsmanship community by organising a Rust Meetup and as a member of the organisation team of a local barcamp.

Simon Dreher
Our training approach
From the needs analysis to the awarding of certificates, we offer customized training courses, flexibly designed and carried out according to your requirements.
If you are interested in in-house training, we will start by identifying your needs and discussing your objectives. This discussion forms the basis for an initial offer.
As soon as the framework data has been clarified, our trainers start adapting the training content. Many of our training courses have a modular structure and offer the opportunity to design the agenda flexibly. Training courses that prepare for certifications, on the other hand, are less flexible. Here, however, you can set the content focus according to your wishes.
You will receive all relevant information in advance of the training. The training will then take place in the room of your choice and at the agreed time. Our trainers will adapt to your requirements.
After completing the training, all participants receive a certificate confirming their participation. You will also have the opportunity to give us feedback on the content and the course. We are always happy to receive praise and suggestions for improvement.
Supplementary information

Collin Rogowski
Head of inovex Academy