4CyberCity - Školení zaměstnanců v kybernetické bezpečnosti

How Mandatory NIS2 Training Works and What It Must Include

Introduction – Training as a Mandatory Part of NIS2

NIS2 requires companies to ensure regular training for all employees and management. This is not just a one-time activity, but an ongoing process designed to increase cybersecurity awareness and reduce the risk of incidents.

If a company cannot prove that the training took place and meets NIS2 requirements, it may face significant penalties.

What NIS2 Training Must Include

For All Employees (Basic Module)

  • Password security
  • Phishing and suspicious emails
  • Security incidents and incident response
  • Physical security and clean desk policy
  • Remote work and BYOD
  • Personal data protection
  • Social engineering
  • Data backup and responsibility for data
  • Ethics and legal responsibility
  • Basics of supplier security

For Management Personnel (Management Module)

  • Legal responsibility of management
  • Cybersecurity strategy and risk management
  • The role of management during incidents
  • Security investments
  • Supply chains and outsourcing risks
  • Management of data and information assets
  • Security culture and leadership
  • Communication with regulatory authorities
  • Business continuity and recovery planning
  • Overview of current threats and trends

How the Training Works in Practice

  1. Access to the e-learning platform – participants log in from anywhere.
  2. Step-by-step modules – lessons enhanced with interactive tasks, scenarios, and quizzes.
  3. Knowledge verification – a final test with a minimum score required for successful completion.
  4. Certificate of completion – automatically generated and containing a QR code with metadata for verification.

Benefits of the 4CyberCity E-Learning Platform

  • Covers all mandatory NIS2 training areas.
  • Separate modules for employees and management.
  • Gamification for better knowledge retention.
  • Automatic record keeping and certificate generation.
  • Regular content updates based on legislation and emerging threats.
Scroll to Top