NIS-2 Training for Domain Experts

The NIS2 Directive requires security measures to be implemented during software development and maintenance and calls for fundamental training in information security. This applies not only to developers, but also to the specialist and non-technical participants involved in the software development process, such as domain experts, architects, product owners, and product managers. In this training course, this target group will learn how to comply with the requirements of the NIS2 Directive and to implement appropriate measures and activities in real-world scenarios.

Request now

At a glance

General information

  • Two days of practice-based training (on-site or remote)
  • Flexible training agenda with customisable focus areas

Target group

Domain experts, architects, team leads, product owners, and product managers

Application examples

Overview of security activities in accordance with the NIS2 Directive

Description

With the increasing significance of software systems for digital products comes an increase in the number of threats to which these systems are exposed. Security training for domain experts plays a decisive role in integrating security into the development process from the very beginning and minimising risks. If these issues are neglected, it often remains only a matter of time until vulnerabilities cause serious problems.

This is also being increasingly reinforced by legal and regulatory provisions such as the NIS2 Directive and the Cyber Resilience Act (CRA). These regulations increase the requirements for security activities in companies and call for the more comprehensive, consistent integration of information security. A key element here is specialist training for domain experts. Our NIS2 Training Course for Domain Experts enables companies not only to address regulatory requirements, but also to improve both security awareness within their teams and the long-term quality of the systems they develop.

In addition to ensuring compliance, this also adds long-term value to companies’ business models. After all, reputational damage (and the associated loss of trust) caused by negative reporting poses as great a risk to systems and companies as the vulnerabilities, attacks, and data losses themselves.

Our NIS2 Training Course for Domain Experts provides a fundamental overview of all the relevant phases of a secure software development process. Participants will learn how to evaluate the security of their software more effectively and to implement appropriate measures and activities in real-world scenarios. The course is based on our own experience in software development projects, which enables us to share real-life best practices.

Agenda

  • Introduction to Security: Motivation and Security Goals
  • Context: Compliance (NIS2, CRA, ISO27001, BSI IT Baseline Protection) and Software Security
  • Secure Design: Risk Assessment, Threat Modelling, Security Requirements
  • Secure Processes: Supply Chain Security, Secure Development Life Cycle
  • Overview of Security in Software Development, Testing, and Operation
  • Secure Products: Acceptance, Penetration Testing, Incident Management

Typical questions we answer:

  • What role do domain experts play in the practical implementation of security during the development process?
  • How can these people identify and assess the threats and risks to their software?
  • What security requirements should be taken into account during the software development process and how can they be implemented?
  • What options exist for testing and monitoring the security of software products?
  • How can security activities be integrated into the agile software development life cycle, and which regulatory requirements must be taken into account?
NIS-2 Training for Domain Experts
  • signed certificate of completion
  • in-house training
  • Customization available (agenda, tech stack, language, etc.)
  • small training groups
Request now

Why inovex Academy?

Our offer

The inovex Academy has set itself the task of passing on knowledge about methods and technologies that we already use successfully in our projects.

Curated content

Our trainers create a customized training offer based on your requirements.

Customizable tech stack

In exclusive trainings, we can consider your tech stack for the training content.

Individual assistance

If needed, we can tailor the training to a specific use case of your company and work directly based on your data.

Trainers

Our trainers are field-tested experts in their areas of expertise. Through their work in projects, they expand their knowledge day by day and pass on this know-how in their trainings - application-oriented and practice-oriented.

Portraitfoto von Clemens Hübner

Clemens Hübner

ISTOB Zertifizierung
Certified Professional for Project Management Badge
Clemens Hübner has been working at the intersection of software development and security since 2013. After working as a software developer and in penetration testing, he joined inovex as a security engineer in 2018. Today, he supports development projects at concept and implementation level, trains colleagues and customers and advises on DevSecOps. He is invited to speak at conferences in Germany and abroad on current application security topics.
Foto Dr. Michael Gerhäuser

Dr Michael Gerhäuser

ISTOB Zertifizierung
Certificate ISAQB Certified Professional for Software Architecture - Foundation Level
Dr. Michael Gerhäuser has been working professionally as a software developer since 2014 and joined the inovex team in 2022. He specialises in the design and implementation of web applications, both frontend and backend with operations and monitoring. He is also interested in topics such as software performance and web application security. In his private life, Michael is involved in the local software craftsmanship community by organising a Rust Meetup and as a member of the organisation team of a local barcamp.
Foto des Trainers Simon Dreher

Simon Dreher

Simon Dreher is a Security & Cloud Platform Engineer at inovex GmbH. Over the past few years, he has gained experience with various cloud platforms, sometimes even behind the scenes. In his projects, he builds platforms for and with developers, and successfully navigates the balance between security and usability for developers. He is particularly interested in Kubernetes and cloud security.

Our training approach

From the needs analysis to the awarding of certificates, we offer customized training courses, flexibly designed and carried out according to your requirements.

If you are interested in in-house training, we will start by identifying your needs and discussing your objectives. This discussion forms the basis for an initial offer.

As soon as the framework data has been clarified, our trainers start adapting the training content. Many of our training courses have a modular structure and offer the opportunity to design the agenda flexibly. Training courses that prepare for certifications, on the other hand, are less flexible. Here, however, you can set the content focus according to your wishes.

You will receive all relevant information in advance of the training. The training will then take place in the room of your choice and at the agreed time. Our trainers will adapt to your requirements.

After completing the training, all participants receive a certificate confirming their participation. You will also have the opportunity to give us feedback on the content and the course. We are always happy to receive praise and suggestions for improvement.

Foto von Collin Rogowski
Collin Rogowski
Head of inovex Academy
inovex Logo
Go back
Foto von Collin Rogowski

I look forward to your inquiry.

Collin Rogowski

We are your partner for successful trainings

We would be happy to talk to you personally about your concerns. Get in touch now!

Foto von Collin Rogowski
Collin Rogowski
Head of inovex Academy
  • Individual training offer for your company
  • Over 25 years of experience as inovex Academy