Cybersecurity

NIS 2 Directive Foundation

This course provides a practical introduction to the NIS 2 Directive for professionals responsible for cybersecurity governance, compliance, and regulatory oversight. Participants gain clarity on what NIS 2 requires, who it applies to, and how organizations are expected to structure cybersecurity.

2 daysExam includedPhysical classroomOnline classroomSelf-study
2,500+ professionals trained99% pass rate120+ countries600+ organisations
PECB
1 Jun – 2 Jun
Language
EN
LocationLausanne / Morges & Online
Format
Physical classroomOnline classroom
Physical classroom
  • Instructor-led classroom training course
  • Lifetime access to official PECB training course material (PDF)
  • Official PECB online certification exam
  • Certificate of attendance
  • Official PECB certification
  • One free retake exam
Online classroom
  • Instructor-led online live interactive training course
  • Lifetime access to official PECB training course material (PDF)
  • Official PECB online certification exam
  • Certificate of attendance
  • Official PECB certification
  • One free retake exam
Confirmed
PECB
Available year-round
Language
ENDE
Format
Self-study
Self-study
  • Lifetime access to official PECB training course material (PDF)
  • Official PECB online certification exam
  • Official PECB certification
  • One free retake exam
No date works for you?
Request a private or flexible session

Key takeaways

Explain fundamental concepts and definitions of the NIS 2 Directive
Interpret main NIS 2 requirements for a cybersecurity program
Identify approaches and techniques for implementing NIS 2 requirements
Understand best practices for protecting critical infrastructure from cyber threats

Your trainers for this course

Christophe MAZZOLA
Christophe MAZZOLA

ISO 27001 Lead Implementer · ISO 27001 Lead Auditor · ISO 27002 Lead Manager · ISO 27005 Risk Manager · ISO 31000 Lead Risk Manager

View profile →
14certifications
6domains
Henri HAENNI - Expert in Business Continuity, Risk Management and Information Security Governance
Henri HAENNI

ISO 22301 Lead Implementer · ISO 22301 Lead Auditor · ISO 27001 Lead Implementer · ISO 27005 Risk Manager · EBIOS Risk Manager

30 years of experience in governance and information security. Lecturer at Sorbonne (Paris I Panthéon), EPFL graduate. Led ISO deployments for The Global Fund, central banks, and government organizations across 3 continents.
View profile →
30+Years of experience
SorbonneLecturer
EPFLGraduated
12 PECBCertifications
Meet all our trainers →
PECB
NIS 2 Directive Foundation · Titanium Partnerhighest PECB accreditation levelTitanium Partner

Page contents

Course Description

The NIS 2 Directive represents a significant shift in how cybersecurity is regulated across the EU. It expands scope, strengthens enforcement, and places explicit accountability on management bodies. Many organizations struggle not because controls are missing, but because they misinterpret what the Directive actually requires in practice.

This course is designed to remove that ambiguity. Participants are guided through the structure, intent, and expectations of NIS 2, focusing on how regulators assess compliance rather than how organizations wish to interpret the text. The training explains how NIS 2 connects governance, risk management, incident handling, and supervisory oversight into a single regulatory framework.

Rather than listing legal articles, the course examines how requirements translate into real cybersecurity program decisions. Participants explore how essential and important entities are classified, what proportionality means in enforcement, and how cybersecurity measures are expected to be documented, monitored, and reviewed.

Abilene Academy delivers this course from a governance and compliance perspective. Instructors draw on regulatory practice, supervisory guidance, and real enforcement trends emerging across 2024 and 2025. Practical examples highlight where organizations commonly fail audits, underestimate reporting obligations, or misunderstand management responsibility.

By the end of the course, participants can confidently explain NIS 2 requirements, assess organizational exposure, and support informed decision making around cybersecurity compliance and regulatory readiness.

    • Explain the scope and structure of the NIS 2 Directive
    • Determine organizational classification under NIS 2
    • Interpret cybersecurity governance and risk obligations
    • Identify required components of a NIS 2 aligned program
    • Assess gaps between current controls and Directive expectations
    • Support compliance preparation and supervisory engagement

Professional Testimonials

Had a great experience learning with Abilene Academy, it has been an extremely long time since I have attended an external formal training outside of the business organization I work in. I found this training to be truly beneficial for me to attend. the overall delivery of the course by Henri was superb, he kept us well engage despite having half of the room online and half face to face. The communication from the advisors from the initial enquiry regrading the course up until now has also been great! definitely recommending to my colleagues. Thank you!
TG

Tracey Gillett

Crisis and Operations Management

TUI
Henri and Alexis conducted a focused, intensive four-day ISO/IEC 27001 Lead Implementer Course of immediate relevance to The Global Fund. Participants representing both IT and Risk are now better prepared to design and operationise a corporate ISMS.
AT

Andreas Tamberg

Senior advisors enterprise risk management

The Global Fund
Another stellar training course run by Abilene, thank you for the outstanding organization and logistics. The PECB training material is very rich, well presented with clear explanations and notes.
SB

Simon Baynes

BCMS Manager

MSC MEDITERRANEAN SHIPPING COMPANY SA

Frequently Asked Questions

What is the NIS 2 Directive trying to achieve?

The NIS 2 Directive aims to strengthen cybersecurity and resilience across critical infrastructure and essential services by setting clearer security and governance expectations.

NIS 2 is about resilience at scale, not isolated controls.

Christophe MAZZOLA

ISO 27001 Lead Implementer • ISO 27001 Lead Auditor

NIS 2cyber resiliencecritical infrastructuregovernance

Who should take the NIS 2 Directive Foundation course?

It is best for professionals who need a practical baseline understanding of NIS 2 requirements, including cybersecurity, IT management, and regulatory stakeholders.

A shared baseline understanding reduces friction across teams.

Ramesh PAVADEPOULLE

ISO 27001 Lead Implementer • ISO 27001 Lead Auditor

NIS 2 trainingfoundation courseIT managerscybersecurity professionals

What does 'NIS 2 requirements for a cybersecurity program' mean in practice?

In practice, it means building a structured cybersecurity program with clear ownership, risk-based controls, and repeatable processes for prevention, response, and improvement.

Program thinking turns compliance into capability.

Ramesh PAVADEPOULLE

ISO 27001 Lead Implementer • ISO 27001 Lead Auditor

cybersecurity programNIS 2 requirementsgovernancerisk-based approach

Foundation vs Lead Implementer: which NIS 2 course should you choose?

Choose Foundation to learn concepts and requirements; choose Lead Implementer if you must plan and run an organization's NIS 2 implementation program.

Pick the course that matches your responsibility: understanding or delivery.

Ramesh PAVADEPOULLE

ISO 27001 Lead Implementer • ISO 27001 Lead Auditor

NIS 2 foundationNIS 2 lead implementertraining pathwaycompliance training

What should you be able to explain after NIS 2 Foundation?

You should be able to define key NIS 2 concepts, interpret the main requirements for a cybersecurity program, and recognize common implementation approaches.

Foundation outcomes are clarity, shared language, and better decisions.

Christophe MAZZOLA

ISO 27001 Lead Implementer • ISO 27001 Lead Auditor

learning outcomesNIS 2 foundationNIS2 conceptsrequirements interpretation

Last updated:

Train with practitioners. Pass with confidence.

Abilene Academy is the only PECB Titanium Partner in Switzerland — the highest accreditation tier in the industry — delivering certified training in information security, data protection, AI governance, and GRC compliance. 99% exam pass rate. 2,500+ professionals trained across 120+ countries and trusted by 600+ organizations. Multilingual programmes available.

99%
Exam pass rate
2,500+
Professionals trained
120+
Countries reached
Titanium
The only PECB Titanium Partner in Switzerland
Certification included
Multilingual
EN · FR · ES · DE · IT and more

Trusted by 600+ organisations in 120 countries

  • Airbus logoAirbus
  • Altis logoAltis
  • BCEAO logoBCEAO
  • BCV logoBCV
  • Cargolux logoCargolux
  • Cartier logoCartier
  • Cofco Intl logoCofco Intl
  • Confédération SuisseConfédération Suisse
  • Council of Europe logoCouncil of Europe
  • Dell logoDell
  • Deloitte logoDeloitte
  • Devillard logoDevillard
  • Ebay logoEbay
  • Engie logoEngie
  • Etat de Fribourg logoEtat de Fribourg
  • Etihad Airways logoEtihad Airways
  • Eumetsat logoEumetsat
  • EY logoEY
  • Framatome logoFramatome
  • G42 logoG42
  • Gavi logoGavi
  • Republique et canton de Genève logoRepublique et canton de Genève
  • Groupe Mutuel logoGroupe Mutuel
  • HSBC logoHSBC
  • International atomic energy agency logoIAEA
  • IATA logoIATA
  • IBM logoIBM
  • international Labour organization logoILO
  • IMD logoIMD
  • KPMG logoKPMG
  • Kudelski Security logoKudelski Security
  • Loterie Romande logoLoterie Romande
  • MSC logoMSC
  • Nagra logoNagra
  • nespresso logoNespresso
  • Nestlé logoNestlé
  • Novartis logoNovartis
  • Payot SA logoPayot SA
  • Philips logoPhilips
  • PSA PanamaPSA Panama
  • PWC logoPWC
  • Richemont logoRichemont
  • Roche logoRoche
  • RTS Radio Télévision SuisseRTS
  • Santander logoSantander
  • SAP logoSAP
  • https://www.skyguide.ch/Skyguide
  • Société Générale logoSociete Generale
  • Swisscom logoSwisscom
  • SyzSyz
  • The Global fund logoThe Global fund
  • UNGSC logoUNGSC
  • International computing center logoUNICC

We use cookies to improve your experience

Necessary cookies are always active. You can accept, reject non-essential cookies, or customize your preferences.