- introduction to computer security
- introduction to cryptography
- authentication, access control, security models
- intrusion detection, firewalls
- malware: virus/worms/troyans
- web attacks
- buffer overflow attacks
- human factors, security audits, and social manipulation
- selected current security related problems and technologies
DD238U Computer Security 7.5 credits

Course in computer science that gives an overview of the field of computer security. The course will cover threats as well as counter measures. This course is given solely as contract education. The corresponding programme course is DD2395.
Information per course offering
Choose semester and course offering to see current information and more about the course, such as course syllabus, study period, and application information.
Information for Spring 2026 Start 13 Jan 2026 contract education
- Course location
KTH Campus
- Duration
- 13 Jan 2026 - 13 Mar 2026
- Periods
- P3 (7.5 hp)
- Pace of study
50%
- Application code
60187
- Form of study
Normal Daytime
- Language of instruction
English
- Course memo
- Course memo is not published
- Number of places
Places are not limited
- Target group
Contract education
- Planned modular schedule
- [object Object]
- Schedule
- Schedule is not published
- Part of programme
- No information inserted
Contact
Course syllabus as PDF
Please note: all information from the Course syllabus is available on this page in an accessible format.
Course syllabus DD238U (Spring 2022–)Headings with content from the Course syllabus DD238U (Spring 2022–) are denoted with an asterisk ( )
Content and learning outcomes
Course contents
Intended learning outcomes
After passing the course, the student should be able to
- identify threats against confidentiality, integrity and availability in system
- explain basic terminology and concepts in computer security and use them
- find and use documentation of security related problems and tools
- analyse simple program code and system descriptions to identify vulnerabilities and predict their corresponding threats
- select countermeasures against identified threats and argue for their applicability
- compare countermeasures and evaluate their side effects,
- present and explain their reasoning to others.
Literature and preparations
Literature
You can find information about course literature either in the course memo for the course offering or in the course room in Canvas.
Examination and completion
If the course is discontinued, students may request to be examined during the following two academic years.
Grading scale
P, F
Examination
- KON1 - Partial exam, 3.0 credits, grading scale: P, F
- LAB1 - Laboratory work, 4.5 credits, grading scale: P, F
Examiner
Ethical approach
- All members of a group are responsible for the group's work.
- In any assessment, every student shall honestly disclose any help received and sources used.
- In an oral assessment, every student shall be able to present and answer questions about the entire assignment and solution.
Further information
Course room in Canvas
Registered students find further information about the implementation of the course in the course room in Canvas. A link to the course room can be found under the tab Studies in the Personal menu at the start of the course.
Offered by
Main field of study
Computer Science and Engineering
Education cycle
Second cycle