The course relies on the CySeP week of seminars. The rest of the course unfolds online and through individual
investigations. Students select one of the presented topics (including machine learning security and privacy,
blockchain, cryptography, malware, wireless security, location privacy), a recommended short reading list, and
write a short report on their individual study. They submit their report via Canvas, perform a peer review,
receive comments from the teacher, and finalize their report.
FEP3500 Cybersecurity and Privacy Summer School 3.5 credits
This is a course dedicated to solving real-world security and privacy (S&P) problems. A set of top-notch
seminars, delivered in person, covers a gamut of topics on security and privacy challenges, fundamentals,
cutting-edge solutions, and the latest research results. The course is based on the Cyber-Security and Privacy
(CySeP) Summer School.
Information per course offering
Information for Spring 2024 Start 10 Jun 2024 programme students
- Course location
KTH Campus
- Duration
- 10 Jun 2024 - 25 Aug 2024
- Periods
- Pace of study
25%
- Application code
45042
- Form of study
Normal Daytime
- Language of instruction
English
- Course memo
- Course memo is not published
- Number of places
Places are not limited
- Target group
- No information inserted
- Planned modular schedule
- [object Object]
- Schedule
- Schedule is not published
- Part of programme
- No information inserted
Contact
Course syllabus as PDF
Please note: all information from the Course syllabus is available on this page in an accessible format.
Course syllabus FEP3500 (Spring 2024–)Information for research students about course offerings
Course given every year. The seminars (in-person attendance) are in mid-June. Completion of the individual investigation and report finalization by August 25.
Content and learning outcomes
Course disposition
Course contents
- Solutions of real security and privacy problems.
- Security and privacy challenges.
- Theoretical fundamentals of security and privacy.
- Recent research results in security and privacy.
Intended learning outcomes
After passing the course, the student should be able to:
- Evaluate vulnerabilities and threats in networks, computers, software and applications
- Develop and evaluate defence mechanisms, carrying out security and privacy analyses
- Analyse ethical problems that may arise
- in order to
- Understand, explain, and analyze security and privacy research results in a specific domain/system and initiate own security or privacy investigations towards creating own solutions.
Literature and preparations
Specific prerequisites
Registered PhD student in a Swedish University, in Electrical Engineering, Computer Science, Computer Engineering, Information and Communication Technologies, or related area.
Recommended prerequisites
Knowledge and skills in basic security and privacy, equivalent to course EP2500/EP2510/EP2520/DD2395/DD2391/DD2520/DD2496.
Equipment
None
Literature
CySeP seminar presentations and reading list of research papers.
Examination and completion
If the course is discontinued, students may request to be examined during the following two academic years.
Grading scale
Examination
- PRO1 - Project, 3.5 credits, grading scale: P, F
Based on recommendation from KTH’s coordinator for disabilities, the examiner will decide how to adapt an examination for students with documented disability.
The examiner may apply another examination format when re-examining individual students.
The evaluation is done based on the written report, in its final form, and the peer review submitted
by the student. The work is performed individually. The report is based on the selected seminar
topic, recommended reading, and the individual investigation results. The work includes one week of
attendance and 2 weeks of individual study and half a week of reviewing and additional reading.
Report, draft and final, and peer-review are submitted in Canvas.
Based on recommendation from KTH’s coordinator for disabilities, the examiner will decide how to
adapt an examination for students with documented disability. The examiner may apply another
examination format when re-examining individual students.
Other requirements for final grade
Compulsory attendance during the summer school week.
Opportunity to complete the requirements via supplementary examination
Opportunity to raise an approved grade via renewed examination
Examiner
Ethical approach
- All members of a group are responsible for the group's work.
- In any assessment, every student shall honestly disclose any help received and sources used.
- In an oral assessment, every student shall be able to present and answer questions about the entire assignment and solution.