DD2302 The Cybersecurity Engineer's Role in Society 5.0 credits
Programme-integrating course for TCYSM.
Choose semester and course offering
Choose semester and course offering to see current information and more about the course, such as course syllabus, study period, and application information.
Content and learning outcomes
The course extends over two years, i.e., eight periods. Each period has a topic work that includes different subjects that all students work with at the same time. The work consists of study material and/or lectures around an issue. It is reported in the form of a written assignment and/or oral reporting and/or active seminar participation. Subjects that are treated are for example:
- scientific methods in cybersecurity,
- gender equality, diversity and equal conditions,
- ethical dilemmas (for example offensive security, the balance between personal integrity and supervision and how identified vulnerabilities should be communicated with the surrounding world .)
- working life, and
- reflection over the studies.
In addition, there is a course component that students can choose to complete at any time (during semester). This component treats theory of knowledge and scientific methodology in the cybersecurity area, including their relation to different aspects of the subjects above. This item is reported in the form of a written assignment and active seminar participation.
Intended learning outcomes
After passing the course, the student shall be able to
- analyse and discuss how the use and development of digital systems and in particular the security of these systems affect and are affected by social, economic, environmental, work environmental and ethical sustainability as well as diversity, gender equality and equal rights
- assess, analyse, and discuss the quality in, and ethical aspects of, knowledge generation related to digital systems and in particular the security of these systems
- relate the different parts of scientific method, how they relate to one another, contribute and not contribute to scientificity in security
- review critically and reflect on both the set-up and implementation of the education as well as their own study situation, their skills in relation to the objective of the education and the future professional role and their ability to identify their own need of additional knowledge
- plan and carry out assignments within given time frames and available resources
- write short, clear and arguing texts based on own analysis as well as given material.
in order to:
- be able to communicate and explain risks and benefits with security (and deficiency thereof) in digital systems in society for individuals without expertise in cybersecurity
- understand external consequences of their own conduct related to security (and deficiency thereof) in digital systems and thereby act responsibly
- obtain the most of the education and the working life in a long-term perspective,
- influence the development of the programme.
Literature and preparations
Examination and completion
If the course is discontinued, students may request to be examined during the following two academic years.
- INLA - Seminars and assignments, 3.0 credits, grading scale: P, F
- UPP1 - Oral and wirtten assignments, 1.0 credits, grading scale: P, F
- UPP2 - Oral and written assignments, 1.0 credits, grading scale: P, F
Based on recommendation from KTH’s coordinator for disabilities, the examiner will decide how to adapt an examination for students with documented disability.
The examiner may apply another examination format when re-examining individual students.
Other requirements for final grade
Active participation in all compulsory meetings.
Opportunity to complete the requirements via supplementary examination
Opportunity to raise an approved grade via renewed examination
- All members of a group are responsible for the group's work.
- In any assessment, every student shall honestly disclose any help received and sources used.
- In an oral assessment, every student shall be able to present and answer questions about the entire assignment and solution.
Further information about the course can be found on the Course web at the link below. Information on the Course web will later be moved to this site.Course web DD2302
Main field of study
In this course, the EECS code of honor applies, see: