In this course, the students apply their knowledge and skills in cybersecurity on concrete scenarios and systems. In a smaller group project, the students practice systems analysis, design, development and assessment of solutions from a security perspective through problem-based learning.
DD2394 Cybersecurity Project 1.5 credits
Project work in cybersecurity. Cross listed with DD2391 Cybersecurity overview (DD2391 corresponds to DD2395 plus DD2394).
Information per course offering
Information for Autumn 2024 cybproj24 programme students
- Course location
KTH Campus
- Duration
- 26 Aug 2024 - 27 Oct 2024
- Periods
- P1 (1.5 hp)
- Pace of study
10%
- Application code
50555
- Form of study
Normal Daytime
- Language of instruction
English
- Course memo
- Course memo is not published
- Number of places
Places are not limited
- Target group
Students at master's programmes as long as it can be included in your programme.
- Planned modular schedule
- [object Object]
- Schedule
- Part of programme
- No information inserted
Contact
Course syllabus as PDF
Please note: all information from the Course syllabus is available on this page in an accessible format.
Course syllabus DD2394 (Autumn 2022–)Content and learning outcomes
Course contents
Intended learning outcomes
After passing the course, the student shall be able to
- analyse simple program code and systems (based on given or self-made system descriptions) to identify vulnerabilities and predict corresponding threats
- select countermeasures against identified threats and argue for their suitability
- apply countermeasures
- find and use documentation of security related problems and tools
- present and explain their reasoning to others,
in order to
- be able to develop software and computer system with security in mind
- be able to move on and specialise in the cybersecurity area
- assess the difficulty of a security problem in relation to their own ability to decide when they can handle it alone and when they need to consult an expert.
Literature and preparations
Specific prerequisites
Knowledge in computer security, 6 higher education credits, equivalent to completed course DD2395.
Active participation in a course offering where the final examination is not yet reported in LADOK is considered equivalent to completion of the course.
Being registered for a course counts as active participation.
The term 'final examination' encompasses both the regular examination and the first re-examination.
Equipment
Literature
Examination and completion
If the course is discontinued, students may request to be examined during the following two academic years.
Grading scale
Examination
- PRO1 - Project work, 1.5 credits, grading scale: P, F
Based on recommendation from KTH’s coordinator for disabilities, the examiner will decide how to adapt an examination for students with documented disability.
The examiner may apply another examination format when re-examining individual students.
Opportunity to complete the requirements via supplementary examination
Opportunity to raise an approved grade via renewed examination
Examiner
Ethical approach
- All members of a group are responsible for the group's work.
- In any assessment, every student shall honestly disclose any help received and sources used.
- In an oral assessment, every student shall be able to present and answer questions about the entire assignment and solution.
Further information
Course room in Canvas
Offered by
Main field of study
Education cycle
Add-on studies
Supplementary information
In this course, the EECS code of honor applies, see: http://www.kth.se/en/eecs/utbildning/hederskodex.