Skip to main content

Online Course in Ethical Hacking 7,5 hp

In this course, students learn ethical hacking in order audit and improve the cybersecurity of computer networks. At the start of the course, students are confronted with a (rigged) corporate network environment. The objective is to penetrate the network and exfiltrate valuable information. This will require exploiting vulnerabilities, installing trojans, dumping hashes, cracking passwords, breaching firewalls, spoofing servers, cracking wifi networks, and more.

Stock image

KTH Contract teaching – Uppdragsutbildning

Dates: 3 September – 10 December 2021
Expected workload: 15h/week.
Cost: 20 000 SEK. Your employer will be charged for the course.
Credits: 7,5 credits are awarded in the LADOK system.
Where: Student-controlled schedule. No physical meetings, you can enjoy the course wherever in the world.

Note: Contract teaching is only available through your employer. The couse is not available to private persons.

Register here by 31 July

To the course application

Read about the course in the media

Han utbildar företagare till hackare (DI)
Vithattar blir svarta på KTH​​​​​​​ (Voister)
Kurser i etisk hackning ska öka it-säkerhet (Radio P1 Ekot)
Den goda hackern (Radio P1 Uppkopplad)
KTH öppnar sin utbildning i etisk hackning – företagen också välkomna (Computer Sweden)
Ny KTH-kurs ska lära företag att tänka som hackare (Ny Teknik)
Nu kan du plugga till hackare på KTH (Computer Sweden)
KTH utbildar i etisk hackning (Radio P3)
Swedish University Offers ‘Ethical Hacking' Courses for 'Greater IT Security' (Sputnik news)
Шведский ВУЗ будет готовить хакеров (Kompravda)

Learning Objectives

Upon completion of this course you should be able to:

  • perform reconnaissance, identifying and selecting targets for attack, e.g. by means of network scanning,
  • identify vulnerabilities in network equipment and applications,
  • deploy and execute exploits on vulnerable systems,
  • install and use remote access trojans for remote system control,
  • identify password files and extract passwords,
  • exfiltrate data,
  • crack wifi networks,
  • implement solutions to strengthen the information security of computer networks.

Guest Lectures

In addition to the course material available exclusively to students, we also offer a set of guest lectures open to the general public on KTH Campus Valhallavägen. In 2019, these were the lectures (no IRL lectures in 2020 due to Covid-19):

André Catry, Cyber Forensic Expert at Nixu Corporation,
Digital forensics and investigations
Sept 3, 2019, 15:15-17:00
Room F2, Lindstedtsvägen 26, floor 2, Sing- Sing, KTH Campus.

​​​​​Joakim Grundwall, CTO MSAB,
Breaking the security of modern smartphones
Sept 10, 2019, 15:15-17:00
Room M1, Brinellvägen 64, floor 2, Maskin, KTH Campus.

Robert Malmgren, Computer & Network Security Consultant at ROMAB,
The Logica intrusion investigation
Sept 24, 2019, 15:15-17:00,
Room E1, Lindstedtsvägen 3, E-huset, huvudbyggnaden, våningsplan 2, KTH Campus

Sanne Femling, Oliver Rickfors, Knowit
Penetration testing in practice,
Oct 8, 2019, 15:15-17:00
Room Q1, Malvinas väg 4, Q-huset, våningsplan 3, KTH Campus



As a prerequisite, participants are expected to have basic programming skills. Knowledge about operating systems (Linux in particular) and communication networks is a plus. No previous experience of information security is required.


All material is in English, but teachers are also fluent in Swedish.

Reviews from former students

 “Absolutely amazing course, 10/10. Best course I've ever taken, both in terms of how much I learned and how much fun I had doing it.”

Course survey 2018 (pdf 550 kB) Course survey 2017 (pdf 230 kB)

Former students share their stories

Anders from Volvo

– Feelings go up and down all the time during the course.

Lina from Ericsson

– Increased knowledge of intrusion gives me power to build more secure solutions.

Jörgen from OP5

– To win over the hacks, you have to think like a hacker.

Need more information?

This is how the course is organized

Contract (pdf 109 kB) ​​​​​​​


Please contact Pontus Johnson  


Page responsible:Pontus Johnson
Belongs to: Network and Systems Engineering
Last changed: Jan 20, 2021