Skip to main content
Till KTH:s startsida Till KTH:s startsida

DD2302 The Cybersecurity Engineer's Role in Society 5.0 credits

Programme-integrating course for TCYSM.

About course offering

For course offering

Autumn 2022 cybsam22 programme students

Target group

Open to TCYSM and students from year 3.

Part of programme

Master's Programme, Cybersecurity, åk 1, Mandatory

Master's Programme, Cybersecurity, åk 2, Mandatory


Autumn 2022: P1 (0.3 hp), P2 (0.2 hp)

Spring 2023: P3 (0.3 hp), P4 (0.2 hp)

Autumn 2023: P1 (3.3 hp), P2 (0.2 hp)

Spring 2024: P3 (0.3 hp), P4 (0.2 hp)


29 Aug 2022
3 Jun 2024

Pace of study


Form of study

Normal Daytime

Language of instruction


Course location

KTH Campus

Number of places

Places are not limited

Planned modular schedule


For course offering

Autumn 2022 cybsam22 programme students

Application code



For course offering

Autumn 2022 cybsam22 programme students


No information inserted

Course coordinator

No information inserted


No information inserted
Headings with content from the Course syllabus DD2302 (Autumn 2022–) are denoted with an asterisk ( )

Content and learning outcomes

Course contents

The course extends over two years, i.e., eight periods. Each period has a topic work that includes different subjects that all students work with at the same time. The work consists of study material and/or lectures around an issue. It is reported in the form of a written assignment and/or oral reporting and/or active seminar participation. Subjects that are treated are for example:

  • scientific methods in cybersecurity,
  • gender equality, diversity and equal conditions,
  • sustainability,
  • ethical dilemmas (for example offensive security, the balance between personal integrity and supervision and how identified vulnerabilities should be communicated with the surrounding world .)
  • working life, and
  • reflection over the studies.

In addition, there is a course component that students can choose to complete at any time (during semester). This component treats theory of knowledge and scientific methodology in the cybersecurity area, including their relation to different aspects of the subjects above. This item is reported in the form of a written assignment and active seminar participation.

Intended learning outcomes

After passing the course, the student shall be able to

  • analyse and discuss how the use and development of digital systems and in particular the security of these systems affect and are affected by social, economic, environmental, work environmental and ethical sustainability as well as diversity, gender equality and equal rights
  • assess, analyse, and discuss the quality in, and ethical aspects of, knowledge generation related to digital systems and in particular the security of these systems
  • relate the different parts of scientific method, how they relate to one another, contribute and not contribute to scientificity in security
  • review critically and reflect on both the set-up and implementation of the education as well as their own study situation, their skills in relation to the objective of the education and the future professional role and their ability to identify their own need of additional knowledge
  • plan and carry out assignments within given time frames and available resources
  • write short, clear and arguing texts based on own analysis as well as given material.

in order to:

  • be able to communicate and explain risks and benefits with security (and deficiency thereof) in digital systems in society for individuals without expertise in cybersecurity
  • understand external consequences of their own conduct related to security (and deficiency thereof) in digital systems and thereby act responsibly
  • obtain the most of the education and the working life in a long-term perspective,
  • influence the development of the programme.

Literature and preparations

Specific prerequisites

No information inserted

Recommended prerequisites

No information inserted


No information inserted


No information inserted

Examination and completion

If the course is discontinued, students may request to be examined during the following two academic years.

Grading scale

P, F


  • INLA - Seminars and assignments, 3.0 credits, grading scale: P, F
  • UPP1 - Oral and wirtten assignments, 1.0 credits, grading scale: P, F
  • UPP2 - Oral and written assignments, 1.0 credits, grading scale: P, F

Based on recommendation from KTH’s coordinator for disabilities, the examiner will decide how to adapt an examination for students with documented disability.

The examiner may apply another examination format when re-examining individual students.

Other requirements for final grade

Active participation in all compulsory meetings.

Opportunity to complete the requirements via supplementary examination

No information inserted

Opportunity to raise an approved grade via renewed examination

No information inserted


Ethical approach

  • All members of a group are responsible for the group's work.
  • In any assessment, every student shall honestly disclose any help received and sources used.
  • In an oral assessment, every student shall be able to present and answer questions about the entire assignment and solution.

Further information

Course room in Canvas

Registered students find further information about the implementation of the course in the course room in Canvas. A link to the course room can be found under the tab Studies in the Personal menu at the start of the course.

Offered by

Main field of study

Computer Science and Engineering

Education cycle

Second cycle

Add-on studies

No information inserted

Supplementary information

Overlaps with DD2303 and DA2215.

In this course, the EECS code of honor applies, see: