Skip to main content
Till KTH:s startsida Till KTH:s startsida

FEP3500 Cybersecurity and Privacy Summer School 3.5 credits

This is a course dedicated to solving real-world security and privacy (S&P) problems. A set of top-notch
seminars, delivered in person, covers a gamut of topics on security and privacy challenges, fundamentals,
cutting-edge solutions, and the latest research results. The course is based on the Cyber-Security and Privacy
(CySeP) Summer School.
 

About course offering

For course offering

Spring 2024 Start 10 Jun 2024 programme students

Target group

No information inserted

Part of programme

No information inserted

Periods

Duration

10 Jun 2024
25 Aug 2024

Pace of study

25%

Form of study

Normal Daytime

Language of instruction

English

Course location

KTH Campus

Number of places

Places are not limited

Planned modular schedule

Application

For course offering

Spring 2024 Start 10 Jun 2024 programme students

Application code

45042

Contact

For course offering

Spring 2024 Start 10 Jun 2024 programme students

Examiner

No information inserted

Course coordinator

No information inserted

Teachers

No information inserted
Headings with content from the Course syllabus FEP3500 (Spring 2024–) are denoted with an asterisk ( )

Content and learning outcomes

Course disposition

The course relies on the CySeP week of seminars. The rest of the course unfolds online and through individual
investigations. Students select one of the presented topics (including machine learning security and privacy,
blockchain, cryptography, malware, wireless security, location privacy), a recommended short reading list, and
write a short report on their individual study. They submit their report via Canvas, perform a peer review,
receive comments from the teacher, and finalize their report.

Course contents

  • Solutions of real security and privacy problems.
  • Security and privacy challenges.
  • Theoretical fundamentals of security and privacy.
  • Recent research results in security and privacy.

Intended learning outcomes

After passing the course, the student should be able to:

  • Evaluate vulnerabilities and threats in networks, computers, software and applications
  • Develop and evaluate defence mechanisms, carrying out security and privacy analyses
  • Analyse ethical problems that may arise
  • in order to
  • Understand, explain, and analyze security and privacy research results in a specific domain/system and initiate own security or privacy investigations towards creating own solutions.

Literature and preparations

Specific prerequisites

Registered PhD student in a Swedish University, in Electrical Engineering, Computer Science, Computer Engineering, Information and Communication Technologies, or related area.

Recommended prerequisites

Knowledge and skills in basic security and privacy, equivalent to course EP2500/EP2510/EP2520/DD2395/DD2391/DD2520/DD2496.

Equipment

None

Literature

CySeP seminar presentations and reading list of research papers.

Examination and completion

If the course is discontinued, students may request to be examined during the following two academic years.

Grading scale

P, F

Examination

  • PRO1 - Project, 3.5 credits, grading scale: P, F

Based on recommendation from KTH’s coordinator for disabilities, the examiner will decide how to adapt an examination for students with documented disability.

The examiner may apply another examination format when re-examining individual students.

The evaluation is done based on the written report, in its final form, and the peer review submitted

by the student. The work is performed individually. The report is based on the selected seminar

topic, recommended reading, and the individual investigation results. The work includes one week of

attendance and 2 weeks of individual study and half a week of reviewing and additional reading.

Report, draft and final, and peer-review are submitted in Canvas.

Based on recommendation from KTH’s coordinator for disabilities, the examiner will decide how to

adapt an examination for students with documented disability. The examiner may apply another

examination format when re-examining individual students.

Other requirements for final grade

Compulsory attendance during the summer school week.

Opportunity to complete the requirements via supplementary examination

No information inserted

Opportunity to raise an approved grade via renewed examination

No information inserted

Examiner

Ethical approach

  • All members of a group are responsible for the group's work.
  • In any assessment, every student shall honestly disclose any help received and sources used.
  • In an oral assessment, every student shall be able to present and answer questions about the entire assignment and solution.

Further information

Course room in Canvas

Registered students find further information about the implementation of the course in the course room in Canvas. A link to the course room can be found under the tab Studies in the Personal menu at the start of the course.

Offered by

Main field of study

This course does not belong to any Main field of study.

Education cycle

Third cycle

Add-on studies

No information inserted

Postgraduate course

Postgraduate courses at EECS/Software and Computer Systems