Select the semester and course offering above to get information from the correct course syllabus and course offering.
Companies today have thousands of software based computer systems that all are depending on one another in a large complex network, a system-of-systems. That IT attacks succeed to a large extent due to this complexity. A company needs to understand the whole system while an attacker only needs find one way in. At the same time, there is a large set of attack types that are utilised and plenty of proposed defence mechanisms. This course main content aims to develop students' understanding of:
After passing the course, the students should be able to:
In order to:
No information inserted
Completed course in Programming equivalent DD1315 Programming technique and Matlab, DD1316 Programming technique, C, DD1337 Programming and ID1018 programming I or the equivalent.
No information inserted
Own computer.
Information about the course literature will be announced in the course memo.
A, B, C, D, E, FX, F
Based on recommendation from KTH’s coordinator for disabilities, the examiner will decide how to adapt an examination for students with documented disability.
The examiner may apply another examination format when re-examining individual students.
The examiner decides, in consultation with KTH's coordinator for disabilities (Funka), about possible adapted examination for students with documented, permanent disabilities. The examiner may permit other examination format for re-examination of individual students.
No information inserted
No information inserted
Further information about the course can be found on the Course web at the link below. Information on the Course web will later be moved to this site.
Course web EP2790Computer Science and Engineering
Second cycle
No information inserted
Robert Lagerström
In this course, the EECS code of honor applies, see:
http://www.kth.se/en/eecs/utbildning/hederskodex.