Skip to main content
Till KTH:s startsida Till KTH:s startsida

EP2520 Building Networked Systems Security 7.5 credits

This is a project-/implementation-/lab- based course that enhances and extends the understanding of modern networked systems security. It builds on the preparation of students through the Networked Systems Security course (EP2500). It seeks to hone the ability to deal with open-ended, real-world engineering problems, as well as prepare for independent work on related topics.

The course hones students understanding of concepts and technologies and common security requirements across various systems. It elaborates how features of each system determine the state-of-the-art of security solutions and how design decisions should be made for effective and efficient security solutions. This project-oriented course gives students the opportunity to deal with real-world problems and gain strong insights on implementation; it prepares them for further work in the industry, towards an MSc thesis, and possibly later Licentiate/PhD work, on any topic related to network and system security.

Choose semester and course offering

Choose semester and course offering to see current information and more about the course, such as course syllabus, study period, and application information.

Application

For course offering

Spring 2025 Start 14 Jan 2025 programme students

Application code

60416

Headings with content from the Course syllabus EP2520 (Spring 2021–) are denoted with an asterisk ( )

Content and learning outcomes

Course contents

The course trains students to handle contemporary security problems for networked systems. Through problem-based learning and team-work, students tackle modern technical challenges for cybersecurity. Students investigate requirements, design specifications, prepare solutions with professional tools and critically assess the efficiency of alternative solutions.

Intended learning outcomes

After passing the course, the student should be able to

  • implement networked systems security solutions with specific security requirements and system constraints 
  • implement, analyse and evaluate security mechanisms with regard to the level on the security they provide and the overhead costs for the system

in order to polish the ability to handle open issues and real engineering problems and prepare for a degree project in related subjects.

Literature and preparations

Specific prerequisites

Completed course in operating system equivalent to ID1200/ID1206 or course in computer networks equivalent to EP1100/IK1203/IK1552 or course in cybersecurity equivalent to IV1013.

Active participation in a course offering where the final examination is not yet reported in LADOK is considered equivalent to completion of the course.

Registering for a course is counted as active participation.

The term 'final examination' encompasses both the regular examination and the first re-examination.

Recommended prerequisites

Completed course corresponding to EP2500 Networked Systems Security.

Equipment

No information inserted

Literature

No information inserted

Examination and completion

If the course is discontinued, students may request to be examined during the following two academic years.

Grading scale

A, B, C, D, E, FX, F

Examination

  • PRO1 - Project, 7.5 credits, grading scale: A, B, C, D, E, FX, F

Based on recommendation from KTH’s coordinator for disabilities, the examiner will decide how to adapt an examination for students with documented disability.

The examiner may apply another examination format when re-examining individual students.

Opportunity to complete the requirements via supplementary examination

No information inserted

Opportunity to raise an approved grade via renewed examination

No information inserted

Examiner

Ethical approach

  • All members of a group are responsible for the group's work.
  • In any assessment, every student shall honestly disclose any help received and sources used.
  • In an oral assessment, every student shall be able to present and answer questions about the entire assignment and solution.

Further information

Course room in Canvas

Registered students find further information about the implementation of the course in the course room in Canvas. A link to the course room can be found under the tab Studies in the Personal menu at the start of the course.

Offered by

Main field of study

Computer Science and Engineering, Electrical Engineering

Education cycle

Second cycle

Add-on studies

No information inserted

Contact

Panagiotis Papadimitratos

Supplementary information

In this course, the EECS code of honor applies, see: http://www.kth.se/en/eecs/utbildning/hederskodex.