The course relies on the CySeP week of seminars. The rest of the course unfolds online and through individual investigations. Students select one of the presented topics (including machine learning security and privacy, blockchain, cryptography, malware, wireless security, location privacy), a recommended short reading list, and write a short report on their individual study. They submit their report via Canvas, perform a peer review, receive comments from the teacher, and finalize their report.
FEP3500 Cybersecurity and Privacy Summer School 3.5 credits

This is a course dedicated to solving real-world security and privacy (S&P) problems. A set of top-notch seminars, delivered in person, covers a gamut of topics on security and privacy challenges, fundamentals, cutting-edge solutions, and the latest research results. The course is based on the Cyber-Security and Privacy (CySeP) Summer School.
Information per course offering
Information for Spring 2025 Start 9 Jun 2025 programme students
- Course location
KTH Campus
- Duration
- 9 Jun 2025 - 23 Aug 2025
- Periods
- Pace of study
25%
- Application code
45017
- Form of study
Normal Daytime
- Language of instruction
English
- Course memo
- Course memo is not published
- Number of places
Places are not limited
- Target group
- No information inserted
- Planned modular schedule
- [object Object]
- Schedule
- Part of programme
- No information inserted
Contact
Course syllabus as PDF
Please note: all information from the Course syllabus is available on this page in an accessible format.
Course syllabus FEP3500 (Spring 2024–)Content and learning outcomes
Course disposition
Course contents
- Solutions of real security and privacy problems.
- Security and privacy challenges.
- Theoretical fundamentals of security and privacy.
- Recent research results in security and privacy.
Intended learning outcomes
After passing the course, the student should be able to:
- Evaluate vulnerabilities and threats in networks, computers, software and applications
- Develop and evaluate defence mechanisms, carrying out security and privacy analyses
- Analyse ethical problems that may arise
- in order to
- Understand, explain, and analyze security and privacy research results in a specific domain/system and initiate own security or privacy investigations towards creating own solutions.
Literature and preparations
Specific prerequisites
Registered PhD student in a Swedish University, in Electrical Engineering, Computer Science, Computer Engineering, Information and Communication Technologies, or related area.
Recommended prerequisites
Knowledge and skills in basic security and privacy, equivalent to course EP2500/EP2510/EP2520/DD2395/DD2391/DD2520/DD2496.
Literature
Examination and completion
If the course is discontinued, students may request to be examined during the following two academic years.
Grading scale
Examination
- PRO1 - Project, 3.5 credits, grading scale: P, F
Based on recommendation from KTH’s coordinator for disabilities, the examiner will decide how to adapt an examination for students with documented disability.
The examiner may apply another examination format when re-examining individual students.
The evaluation is done based on the written report, in its final form, and the peer review submitted
by the student. The work is performed individually. The report is based on the selected seminar
topic, recommended reading, and the individual investigation results. The work includes one week of
attendance and 2 weeks of individual study and half a week of reviewing and additional reading.
Report, draft and final, and peer-review are submitted in Canvas.
Based on recommendation from KTH’s coordinator for disabilities, the examiner will decide how to
adapt an examination for students with documented disability. The examiner may apply another
examination format when re-examining individual students.
Other requirements for final grade
Compulsory attendance during the summer school week.
Examiner
Ethical approach
- All members of a group are responsible for the group's work.
- In any assessment, every student shall honestly disclose any help received and sources used.
- In an oral assessment, every student shall be able to present and answer questions about the entire assignment and solution.