Skip to main content

Online Course in Ethical Hacking 7,5 hp

In this course, students learn ethical hacking in order audit and improve the cybersecurity of computer networks. At the start of the course, students are confronted with a (rigged) corporate network environment. The objective is to penetrate the network and exfiltrate valuable information. This will require exploiting vulnerabilities, installing trojans, dumping hashes, cracking passwords, breaching firewalls, spoofing servers, cracking wifi networks, and more.

Stock image

KTH Contract teaching – Uppdragsutbildning

Dates: 4 September – 8 December 2023
Expected workload: 15h/week.
Cost: 20 000 SEK. Your employer will be charged for the course.
Credits: 7,5 credits are awarded in the LADOK system.
Where: Student-controlled schedule. No physical meetings, you can enjoy the course wherever in the world.

Note: Contract teaching is only available through your employer. The couse is not available to private persons.

Register here by 31 July

To the course application

Read about the course in the media

Han utbildar företagare till hackare (DI)
Vithattar blir svarta på KTH​​​​​​​ (Voister)
Kurser i etisk hackning ska öka it-säkerhet (Radio P1 Ekot)
Den goda hackern (Radio P1 Uppkopplad)
KTH öppnar sin utbildning i etisk hackning – företagen också välkomna (Computer Sweden)
Ny KTH-kurs ska lära företag att tänka som hackare (Ny Teknik)
Nu kan du plugga till hackare på KTH (Computer Sweden)
KTH utbildar i etisk hackning (Radio P3)
Swedish University Offers ‘Ethical Hacking' Courses for 'Greater IT Security' (Sputnik news)
Шведский ВУЗ будет готовить хакеров (Kompravda)

Learning Objectives

Upon completion of this course you should be able to:

  • perform reconnaissance, identifying and selecting targets for attack, e.g. by means of network scanning
  • identify vulnerabilities in network equipment and applications
  • customize exploits for software vulnerabilities
  • deploy and execute exploits on vulnerable systems,
  • install and use remote access trojans for remote system control
  • identify password files and extract passwords
  • exfiltrate data
  • implement solutions to strengthen the information security of computer networks
  • carry out legal and ethical security testing.

Guest Lectures

In addition to the course material available exclusively to students, we also offer a set of guest lectures. In 2022, those were as follows:

Mattias Wåhlén, Threat Intelligence Expert at Truesec
The World of Cybercriminals
September 14, 13:15-15:00
F1 (Alfvénsalen), Lindstedtsvägen 22, KTH Campus

Joakim Grundwall, CTO MSAB
Breaking the security of modern smartphones
September 21, 15:15-17:00
F1 (Alfvénsalen), Lindstedtsvägen 22, KTH Campus

Staff from the Swedish Security Service
Ethical hacking at the Swedish Security Service
September 29, 13:15-15:00
F1 (Alfvénsalen), Lindstedtsvägen 22, KTH Campus

Camilla Lundahl, Head of Cybersecurity & IT security at Avanza
The attacker need one door open, we need to keep 2 Million doors closed
October 5, 15:15-17:00
F1 (Alfvénsalen), Lindstedtsvägen 22, KTH Campus



As a prerequisite, participants are expected to have basic programming skills. Knowledge about operating systems (Linux in particular) and communication networks is also strongly recommended. No previous experience of information security is required.


All material is in English, but teachers are also fluent in Swedish.

Reviews from former students

Former students share their stories

Anders from Volvo

– Feelings go up and down all the time during the course.

Lina from Ericsson

– Increased knowledge of intrusion gives me power to build more secure solutions.

Jörgen from OP5

– To win over the hacks, you have to think like a hacker.

Need more information?

This is how the course is organized

Contract EP282U (pdf 117 kB) ​​​​​​​


Please contact Pontus Johnson  


Page responsible:Web editors at EECS
Belongs to: Network and Systems Engineering
Last changed: Apr 05, 2023