Online Course in Ethical Hacking 7,5 hp
In this course, students learn ethical hacking in order audit and improve the cybersecurity of computer networks. At the start of the course, students are confronted with a (rigged) corporate network environment. The objective is to penetrate the network and exfiltrate valuable information. This will require exploiting vulnerabilities, installing trojans, dumping hashes, cracking passwords, breaching firewalls, spoofing servers, cracking wifi networks, and more.
KTH Contract teaching for businesses – Uppdragsutbildning
Dates: January 15 - April 19, 2019
Expected workload: 15h/week.
Cost: 15 000 SEK. Your employer will be charged for the course.
Credits: 7,5 credits are awarded in the LADOK system.
Where: Student-controlled schedule. No physical meetings, you can enjoy the course wherever in the world.
Note: Contract teaching is only available through your employer. The couse is not available to private persons.
Register here by December 15
Read about the course in the media
Upon completion of this course you should be able to:
- perform reconnaissance, identifying and selecting targets for attack, e.g. by means of network scanning,
- identify vulnerabilities in network equipment and applications,
- deploy and execute exploits on vulnerable systems,
- install and use remote access trojans for remote system control,
- identify password files and extract passwords,
- exfiltrate data,
- crack wifi networks,
- implement solutions to strengthen the information security of computer networks.
In addition to the course material available exclusively to students, we also offer a set of guest lectures. These live events will be open to the general public. The autumn course 2018 offers these lectures:
September 4, 15:15-17:00,
Anne-Marie Eklund-Löwinder, CISO IIS,
The Keys to the Internet
September 11, 15:15-17:00,
Jonas Lejon, Senior Cyber Security Specialist, Swedish Armed Forces,
How to become a Bonafide White Hat Hacker
September 25, 15:15-17:00,
Nasser Nowdehi, Vehicular Communication Security Researcher, Volvo,
How to Hack a Car: Attacks and Defenses for Connected Vehicles
October 9, 15:15-17:00,
Joakim Grundwall, CTO, MSAB,
Breaking the Security of Modern Smartphones
The lectures will be held in. The lectures will be recorded and made available on the course's learning platform.
As a prerequisite, participants are expected to have basic programming skills. Knowledge about operating systems (UNIX in particular) and communication networks is a plus. No previous experience of information security is required.
All material is in English, but teachers are also fluent in Swedish.
Reviews of earlier students
This PDF contains the results of the compulsory survey distributed to KTH students in 2017.
Former students share their stories
Need more information?