Skip to main content
Till KTH:s startsida Till KTH:s startsida

EP2500 Networked Systems Security 7.5 credits

The course will focus on security, including privacy, for a spectrum of networked systems, covering: (i) Internet and TCP/IP networks, (ii) Cellular data and voice networks, (iii) wireless local and personal area networks, (iv) Internet of Things and embedded systems, (v) Wireless Sensor Networks, (vi) Mobile ad hoc and hybrid networks, such as vehicular communication systems. While the first three types of networked systems have been the predominant ones, and shall get significant attention, the course shall strive to keep a balance and present upcoming technologies, including, for example, elements on other networked infrastructures such as the smart grid. The emphasis, throughout the course, shall be on basic concepts and technologies, on common security requirements across various systems, and on how features of each system determine the state-of-the-art of security solutions.

About course offering


For course offering

Autumn 2024 Start 28 Oct 2024 programme students

Application code



For course offering

Autumn 2024 Start 28 Oct 2024 programme students


Panagiotis Papadimitratos


No information inserted

Course coordinator

No information inserted


No information inserted
Headings with content from the Course syllabus EP2500 (Autumn 2021–) are denoted with an asterisk ( )

Content and learning outcomes

Course contents

Basically, the course will bring up security including integrity for a spectrum of network systems that includes:

  • Internet and TCP/IP networks,
  • Mobile voice and data networks,
  • Wireless local and personal networks,
  • Wireless sensor networks,
  • Mobile ad hoc and hybrid networks, such as vehicle communication systems

The emphasis in the course lies on basic concepts and technologies about joint security requirements in different systems and about how the functions in each system decide the latest security solutions.

Intended learning outcomes

After passing the course, the student should be able to

  • identify, explain and analyse vulnerabilities, threats and attacks against a number of modern network systems
  • state clear properties and requirements of security solutions for network systems
  • analyse and design security protocols and mechanisms that protect the network operation against attacks
  • explain and analyse qualitatively and quantitatively general security mechanisms
  • identify and analyse best practice for security systems that currently are generally used in network systems

in order to

  • become prepared for future advanced studies in the subject
  • be able to handle open, real technical problems.

Literature and preparations

Specific prerequisites

Completed course in algorithms and data structures equivalent DD1338/DD1327/DD1320/DD1321/ID1020 or completed course in computer engineering equivalent EP1200/DD1377/IS1200/IS1500.

Active participation in a course offering where the final examination is not yet reported in Ladok is considered equivalent to completion of the course.

Registering for a course is counted as active participation.

The term 'final examination' encompasses both the regular examination and the first re-examination.

Recommended prerequisites

Basic knowledge on networking (e.g., parts of EP1100, IK1203, IK1552) and cyber-security (e.g., parts of IV1013). It is however straightforward to take the course without having this knowledge before the start of the course.


No information inserted


No information inserted

Examination and completion

If the course is discontinued, students may request to be examined during the following two academic years.

Grading scale

A, B, C, D, E, FX, F


  • INL1 - Assignment, 2.5 credits, grading scale: P, F
  • KON1 - Assignment, 2.5 credits, grading scale: P, F
  • TEN1 - Examination, 2.5 credits, grading scale: A, B, C, D, E, FX, F

Based on recommendation from KTH’s coordinator for disabilities, the examiner will decide how to adapt an examination for students with documented disability.

The examiner may apply another examination format when re-examining individual students.

Opportunity to complete the requirements via supplementary examination

No information inserted

Opportunity to raise an approved grade via renewed examination

No information inserted


Ethical approach

  • All members of a group are responsible for the group's work.
  • In any assessment, every student shall honestly disclose any help received and sources used.
  • In an oral assessment, every student shall be able to present and answer questions about the entire assignment and solution.

Further information

Course room in Canvas

Registered students find further information about the implementation of the course in the course room in Canvas. A link to the course room can be found under the tab Studies in the Personal menu at the start of the course.

Offered by

Main field of study

Computer Science and Engineering, Information and Communication Technology

Education cycle

Second cycle

Add-on studies

EP2510 Advanced networked system security


Panagiotis Papadimitratos

Supplementary information

In this course, the EECS code of honor applies, see: