Skip to main content
Till KTH:s startsida

EP2500 Networked Systems Security 7.5 credits

The course will focus on security, including privacy, for a spectrum of networked systems, covering: (i) Internet and TCP/IP networks, (ii) Cellular data and voice networks, (iii) wireless local and personal area networks, (iv) Internet of Things and embedded systems, (v) Wireless Sensor Networks, (vi) Mobile ad hoc and hybrid networks, such as vehicular communication systems. While the first three types of networked systems have been the predominant ones, and shall get significant attention, the course shall strive to keep a balance and present upcoming technologies, including, for example, elements on other networked infrastructures such as the smart grid. The emphasis, throughout the course, shall be on basic concepts and technologies, on common security requirements across various systems, and on how features of each system determine the state-of-the-art of security solutions.

Information per course offering

Choose semester and course offering to see current information and more about the course, such as course syllabus, study period, and application information.

Termin

Information for Autumn 2025 Start 27 Oct 2025 programme students

Course location

KTH Campus

Duration
27 Oct 2025 - 12 Jan 2026
Periods
P2 (7.5 hp)
Pace of study

50%

Application code

50313

Form of study

Normal Daytime

Language of instruction

English

Course memo
Course memo is not published
Number of places

Places are not limited

Target group

Open to all students as long as it can be included in your programme

Planned modular schedule
[object Object]
Schedule
Schedule is not published
Part of programme

Contact

Examiner
No information inserted
Course coordinator
No information inserted
Teachers
No information inserted

Course syllabus as PDF

Please note: all information from the Course syllabus is available on this page in an accessible format.

Course syllabus EP2500 (Autumn 2025–)
Headings with content from the Course syllabus EP2500 (Autumn 2025–) are denoted with an asterisk ( )

Content and learning outcomes

Course contents

Basically, the course will bring up security including integrity for a spectrum of network systems that includes:

  • Internet and TCP/IP networks,
  • Mobile voice and data networks,
  • Wireless local and personal networks,
  • Wireless sensor networks,
  • Mobile ad hoc and hybrid networks, such as vehicle communication systems

The emphasis in the course lies on basic concepts and technologies about joint security requirements in different systems and about how the functions in each system decide the latest security solutions.

Intended learning outcomes

After passing the course, the student should be able to

  • identify, explain and analyse vulnerabilities, threats and attacks against a number of modern network systems
  • state properties and requirements of security solutions for network systems clearly
  • analyse and design security protocols and mechanisms that protect the network operation against attacks
  • explain and analyse general security mechanisms qualitatively and quantitatively 
  • identify and analyse best practice for security systems that currently are generally used in network systems

in order to

  • become prepared for future advanced studies in the subject
  • be able to handle open, real technical problems.

Literature and preparations

Specific prerequisites

Knowledge in algorithms and data structures, 6 credits, equivalent to completed course DD1338/DD1320-DD1328/DD2325/ID1020/ID1021

or 

knowledge in computer engineering, 6 credits, equivalent to completed course IS1500/IS1200/EP1200.

Recommended prerequisites

Basic knowledge of computer networks (for example parts of EP1100/IK1203/IK1552) and computer security (for example parts of IV1013) and basic programming (for example DD1337/DD1310-DD1319/DD1321/DD1331/DD100N/ID1018). It is, however, possible to take the course without having this knowledge before the start of the course.

Literature

You can find information about course literature either in the course memo for the course offering or in the course room in Canvas.

Examination and completion

If the course is discontinued, students may request to be examined during the following two academic years.

Grading scale

A, B, C, D, E, FX, F

Examination

  • INL1 - Assignment, 2.5 credits, grading scale: P, F
  • KON1 - Assignment, 2.5 credits, grading scale: P, F
  • TEN1 - Examination, 2.5 credits, grading scale: A, B, C, D, E, FX, F

Based on recommendation from KTH’s coordinator for disabilities, the examiner will decide how to adapt an examination for students with documented disability.

The examiner may apply another examination format when re-examining individual students.

The exam is written.

Examiner

Ethical approach

  • All members of a group are responsible for the group's work.
  • In any assessment, every student shall honestly disclose any help received and sources used.
  • In an oral assessment, every student shall be able to present and answer questions about the entire assignment and solution.

Further information

Course room in Canvas

Registered students find further information about the implementation of the course in the course room in Canvas. A link to the course room can be found under the tab Studies in the Personal menu at the start of the course.

Offered by

Main field of study

Computer Science and Engineering, Information and Communication Technology

Education cycle

Second cycle

Supplementary information

In this course, the EECS code of honor applies, see:
http://www.kth.se/en/eecs/utbildning/hederskodex.