Skip to main content

Online Course in Ethical Hacking 7,5 hp

In this course, students learn ethical hacking in order audit and improve the cybersecurity of computer networks. At the start of the course, students are confronted with a (rigged) corporate network environment. The objective is to penetrate the network and exfiltrate valuable information. This will require exploiting vulnerabilities, installing trojans, dumping hashes, cracking passwords, breaching firewalls, spoofing servers, cracking wifi networks, and more.

Stock image

KTH Contract teaching – Uppdragsutbildning

Dates: 1 September – 8 December 2022
Expected workload: 15h/week.
Cost: 20 000 SEK. Your employer will be charged for the course.
Credits: 7,5 credits are awarded in the LADOK system.
Where: Student-controlled schedule. No physical meetings, you can enjoy the course wherever in the world.

Note: Contract teaching is only available through your employer. The couse is not available to private persons.

Register here by 31 July

To the course application

Read about the course in the media

Han utbildar företagare till hackare (DI)
Vithattar blir svarta på KTH​​​​​​​ (Voister)
Kurser i etisk hackning ska öka it-säkerhet (Radio P1 Ekot)
Den goda hackern (Radio P1 Uppkopplad)
KTH öppnar sin utbildning i etisk hackning – företagen också välkomna (Computer Sweden)
Ny KTH-kurs ska lära företag att tänka som hackare (Ny Teknik)
Nu kan du plugga till hackare på KTH (Computer Sweden)
KTH utbildar i etisk hackning (Radio P3)
Swedish University Offers ‘Ethical Hacking' Courses for 'Greater IT Security' (Sputnik news)
Шведский ВУЗ будет готовить хакеров (Kompravda)

Learning Objectives

Upon completion of this course you should be able to:

  • perform reconnaissance, identifying and selecting targets for attack, e.g. by means of network scanning,
  • identify vulnerabilities in network equipment and applications,
  • deploy and execute exploits on vulnerable systems,
  • install and use remote access trojans for remote system control,
  • identify password files and extract passwords,
  • exfiltrate data,
  • crack wifi networks,
  • implement solutions to strengthen the information security of computer networks.

Guest Lectures

In addition to the course material available exclusively to students, we also offer a set of guest lectures. In 2021, these were the following:

Carolina Vendil Pallin, FOI (Swedish Defence Research Agency)
David Olgart, Cyber section, Swedish Armed Forces Headquarters
Russia's Digital Offensive
September 14, 2021, 15:15-17:00
Online & Room Q1, Malvinas väg 4, KTH Campus

Johan von Konow & Georgios Mavrogonatos, Cparta Cyber Defense
Tales from red and blue teams
September 23, 2021, 15:15-17:00
Online & Room Q1, Malvinas väg 4, KTH Campus

Staff from the Swedish Security Service
Ethical hacking at the Swedish Security Service
September 30, 2021, 15:15-17:00,
Room Q1, Malvinas väg 4, KTH Campus

Joakim Grundwall, CTO MSAB
Breaking the security of modern smartphones
October 5, 2021, 15:15-17:00
Room Q1, Malvinas väg 4, KTH Campus



As a prerequisite, participants are expected to have basic programming skills. Knowledge about operating systems (Linux in particular) and communication networks is a plus. No previous experience of information security is required.


All material is in English, but teachers are also fluent in Swedish.

Reviews from former students

 “Absolutely amazing course, 10/10. Best course I've ever taken, both in terms of how much I learned and how much fun I had doing it.”

Course survey 2018 (pdf 550 kB) Course survey 2017 (pdf 230 kB)

Former students share their stories

Anders from Volvo

– Feelings go up and down all the time during the course.

Lina from Ericsson

– Increased knowledge of intrusion gives me power to build more secure solutions.

Jörgen from OP5

– To win over the hacks, you have to think like a hacker.

Need more information?

This is how the course is organized

Contract EP272U 2022 (in Swedish) (pdf 108 kB) ​​​​​​​


Please contact Pontus Johnson  


Page responsible:Web editors at EECS
Belongs to: Network and Systems Engineering
Last changed: Mar 04, 2022