Skip to main content
Till KTH:s startsida

FEP3200 Networked Systems Security 8.0 credits

Information per course offering

Termin

Information for Autumn 2024 Start 28 Oct 2024 programme students

Course location

KTH Campus

Duration
28 Oct 2024 - 13 Jan 2025
Periods
P2 (8.0 hp)
Pace of study

50%

Application code

51537

Form of study

Normal Daytime

Language of instruction

English

Course memo
Course memo is not published
Number of places

Places are not limited

Target group
No information inserted
Planned modular schedule
[object Object]
Part of programme
No information inserted

Contact

Examiner
No information inserted
Course coordinator
No information inserted
Teachers
No information inserted
Contact

Panagiotis Papadimitratos

Course syllabus as PDF

Please note: all information from the Course syllabus is available on this page in an accessible format.

Course syllabus FEP3200 (Spring 2019–)
Headings with content from the Course syllabus FEP3200 (Spring 2019–) are denoted with an asterisk ( )

Content and learning outcomes

Course contents

The course will work on security, including privacy, for a spectrum of networked systems, covering: (i) Internet and TCP/IP networks, (ii) Cellular data and voice networks, (iii) wireless local and personal area networks, (iv) Internet of Things and embedded systems, (v) Wireless Sensor Networks, (vi) Mobile ad hoc and hybrid networks, such as vehicular communication systems. While the first three types of networked systems have been the predominant ones, and shall get significant attention, the course shall strive to keep a balance and present upcoming technologies. The emphasis, throughout the course, shall be on basic concepts and technologies, on common security requirements across various systems, and on how features of each system determine the state-of-the-art of security solutions.

NSS sets the ground for its companion courses, “Advanced Networked Systems Security” and “Building Networked Systems Security.” The latter ones will offer the opportunity to deal with security and privacy problems in a deeper and entirely hands-on manner.

Intended learning outcomes

At the end of the course, students shall be able to:

(i) Identify, comprehend, and analyze vulnerabilities, threats, and attacks against a variety of modern networked systems.

(ii) State clearly security properties and requirements for networked systems security solutions.

(iii) Analyze and design security protocols and mechanisms that safeguard the network operation against attacks.

(iv) Comprehend and analyzequalitatively and quantitativelythe overhead of security mechanisms.

(v) Identify and analyze best practices for security schemes deployed widely in networked systems.

Literature and preparations

Specific prerequisites

No information inserted

Equipment

No information inserted

Literature

No information inserted

Examination and completion

If the course is discontinued, students may request to be examined during the following two academic years.

Grading scale

P, F

Examination

  • EXA1 - Examination, 8.0 credits, grading scale: P, F

Based on recommendation from KTH’s coordinator for disabilities, the examiner will decide how to adapt an examination for students with documented disability.

The examiner may apply another examination format when re-examining individual students.

Other requirements for final grade

Assignments and exams will be graded and they are all mandatory for successfully completing the course and they are all part of the calculation of the final grade. Each component (exam and assignment) will be graded independently. The exams shall be 25% and 30% of the total grade respectively, and the assignments shall weigh the remaining 45%. Final grades: they are in the letter scale, A-F for MSc students; pass/fail for PhD students.

Opportunity to complete the requirements via supplementary examination

No information inserted

Opportunity to raise an approved grade via renewed examination

No information inserted

Examiner

Ethical approach

  • All members of a group are responsible for the group's work.
  • In any assessment, every student shall honestly disclose any help received and sources used.
  • In an oral assessment, every student shall be able to present and answer questions about the entire assignment and solution.

Further information

Course room in Canvas

Registered students find further information about the implementation of the course in the course room in Canvas. A link to the course room can be found under the tab Studies in the Personal menu at the start of the course.

Offered by

Main field of study

This course does not belong to any Main field of study.

Education cycle

Third cycle

Add-on studies

No information inserted

Contact

Panagiotis Papadimitratos

Postgraduate course

Postgraduate courses at EECS/Software and Computer Systems