- introduction to computer security
- introduction to cryptography
- authentication, access control, security models
- intrusion detection, firewalls
- malware: virus/worms/troyans
- web attacks
- buffer overflow attacks
- human factors, security audits, and social manipulation
- selected current security related problems and technologies
DD238U Computer Security 7.5 credits
Course in computer science that gives an overview of the field of computer security. The course will cover threats as well as counter measures. This course is given solely as contract education. The corresponding programme course is DD2395.
Information per course offering
Information for Spring 2025 Start 14 Jan 2025 contract education
- Course location
KTH Campus
- Duration
- 14 Jan 2025 - 16 Mar 2025
- Periods
- P3 (7.5 hp)
- Pace of study
50%
- Application code
60710
- Form of study
Normal Daytime
- Language of instruction
English
- Course memo
- Course memo is not published
- Number of places
Places are not limited
- Target group
- No information inserted
- Planned modular schedule
- [object Object]
- Schedule
- Schedule is not published
- Part of programme
- No information inserted
Contact
Course syllabus as PDF
Please note: all information from the Course syllabus is available on this page in an accessible format.
Course syllabus DD238U (Spring 2022–)Headings with content from the Course syllabus DD238U (Spring 2022–) are denoted with an asterisk ( )
Content and learning outcomes
Course contents
Intended learning outcomes
After passing the course, the student should be able to
- identify threats against confidentiality, integrity and availability in system
- explain basic terminology and concepts in computer security and use them
- find and use documentation of security related problems and tools
- analyse simple program code and system descriptions to identify vulnerabilities and predict their corresponding threats
- select countermeasures against identified threats and argue for their applicability
- compare countermeasures and evaluate their side effects,
- present and explain their reasoning to others.
Literature and preparations
Recommended prerequisites
No information inserted
Equipment
No information inserted
Literature
No information inserted
Examination and completion
If the course is discontinued, students may request to be examined during the following two academic years.
Grading scale
P, F
Examination
- KON1 - Partial exam, 3.0 credits, grading scale: P, F
- LAB1 - Laboratory work, 4.5 credits, grading scale: P, F
Opportunity to complete the requirements via supplementary examination
No information inserted
Opportunity to raise an approved grade via renewed examination
No information inserted
Examiner
Ethical approach
- All members of a group are responsible for the group's work.
- In any assessment, every student shall honestly disclose any help received and sources used.
- In an oral assessment, every student shall be able to present and answer questions about the entire assignment and solution.
Further information
Course room in Canvas
Registered students find further information about the implementation of the course in the course room in Canvas. A link to the course room can be found under the tab Studies in the Personal menu at the start of the course.
Offered by
Main field of study
Computer Science and Engineering
Education cycle
Second cycle
Add-on studies
No information inserted