- introduction to computer security
- introduction to cryptography
- authentication, access control, security models
- intrusion detection, firewalls
- malware: virus/worms/troyans
- web attacks
- system security, buffer overflow attacks, side channels
- human factors, security audits, and social manipulation
- selected current security related problems and technologies
DD2391 Cybersecurity Overview 7.5 credits
Overview of cybersecurity. Cross listed with DD2395 Computer security and DD2394 Cybersecurity project. This means that their content overlaps: DD2391 (7.5 ECTS) is equivalent to DD2395 (6 ECTS) plus DD2394 (1.5 ECTS). DD2391 therefore cannot be combined with DD2394 or DD2395. One can only combine DD2394 with DD2395 and receive credits for both.
Information per course offering
Information for Autumn 2024 cybov24 programme students
- Course location
KTH Campus
- Duration
- 26 Aug 2024 - 27 Oct 2024
- Periods
- P1 (7.5 hp)
- Pace of study
50%
- Application code
50445
- Form of study
Normal Daytime
- Language of instruction
English
- Course memo
- Number of places
Places are not limited
- Target group
Open for students from year 3 of all programmes and students at master's programmes, as long as it can be included in your programme.
- Planned modular schedule
- [object Object]
- Schedule
- Part of programme
Contact
Musard Balliu (musard@kth.se)
Course syllabus as PDF
Please note: all information from the Course syllabus is available on this page in an accessible format.
Course syllabus DD2391 (Autumn 2022–)Content and learning outcomes
Course contents
Intended learning outcomes
After passing the course, the student shall be able to
- identify threats against confidentiality, integrity and availability in digital systems
- explain basic terminology and concepts in computer security and use them
- find and use documentation of security related problems and tools
- analyse simple program code and systems (based on given or self-made system descriptions) to identify vulnerabilities and predict corresponding threats
- select countermeasures against identified threats and argue for their suitability
- compare countermeasures and evaluate their side effects,
- apply countermeasures
- present and explain their reasoning to others,
in order to
- be able to develop software and computer systems with security in mind
- be able to move on and specialise in the cybersecurity area
- assess the difficulty of a security problem in relation to their own ability to decide when they can handle it alone and when they need to consult an expert.
Literature and preparations
Specific prerequisites
Knowledge and skills in programming, 5 credits, equivalent to completed course DD1337/DD1310-DD1318/DD1321/DD1331/DD100N/ID1018.
Knowledge in foundations of computer science, 6 credits, equivalent to DD1320-DD1327/DD1338/ID1020/ID1021.
Recommended prerequisites
Equipment
Literature
Examination and completion
If the course is discontinued, students may request to be examined during the following two academic years.
Grading scale
Examination
- LAB1 - Laboratory work, 3.0 credits, grading scale: P, F
- PRO1 - Project work, 1.5 credits, grading scale: P, F
- TEN1 - Written exam, 3.0 credits, grading scale: A, B, C, D, E, FX, F
Based on recommendation from KTH’s coordinator for disabilities, the examiner will decide how to adapt an examination for students with documented disability.
The examiner may apply another examination format when re-examining individual students.
Opportunity to complete the requirements via supplementary examination
Opportunity to raise an approved grade via renewed examination
It is not possible to raise an approved grade.
Examiner
Ethical approach
- All members of a group are responsible for the group's work.
- In any assessment, every student shall honestly disclose any help received and sources used.
- In an oral assessment, every student shall be able to present and answer questions about the entire assignment and solution.
Further information
Course room in Canvas
Offered by
Main field of study
Education cycle
Add-on studies
Contact
Supplementary information
In this course, the EECS code of honor applies, see: http://www.kth.se/en/eecs/utbildning/hederskodex.