Section 1: Intro and how to use this page
The SIGS Cybersec research school offers a structured portfolio of doctoral courses in cybersecurity. This page summarizes the courses, indicates when they are typically taken, and provides a quick overview so that PhD students can plan their study path efficiently.
There are two main types of courses:
- Mandatory courses in cybersecurity organized by SIGS Cybersec.
- Elective courses in cybersecurity organized by SIGS Cybersec.
Use the summary table below to get a quick overview, then expand the detailed sections for each category.
Note: Each host university maintains its own set of mandatory doctoral courses that students must complete in addition to the SIGS Cybersec offering. These requirements vary between institutions. Students should always consult the official syllabus, study plan, and doctoral regulations of their home university to ensure compliance with local degree requirements.
Section 2: Summary table of courses
Mandatory Courses in Cybersecurity
| Course | Credits (hp) | Organizer | Period / Notes |
|---|---|---|---|
| 7DAV023 Introduction to Privacy and Privacy Enhancing Technologies | 3 | Karlstad University (KAU) | |
| Future Network Security (5G/6G, IoT) | 3 | Blekinge Institute of Technology (BTH) | November 2024 – January 2025 |
| AI and Cybersecurity | 3 | Örebro University (ORU) | April – June (every year) |
| Introduction to Ethical Hacking | 3 | Karlstad University (KAU) | Spring 2025 |
| 7DAV010 CTF Challenges | 4 | Karlstad University (KAU) | |
| Security Management and Human Factors | 2 | Karlstad University (KAU) | June 2025 |
| Career Planning | 2 | Karlstad University (KAU) | Scheduled 2027 |
| Innovation and Entrepreneurship | 2 | Karlstad University (KAU) | Scheduled 2027 |
Elective Courses in Cybersecurity
| Course | Credits (hp) | Organizer | Period / Notes |
|---|---|---|---|
| Distributed Security for Future Networks | 5 | Blekinge Institute of Technology (BTH) | Late Spring 2026 |
| Cybersecurity for the IoT | 3 | Örebro University (ORU) | January – March (each year) |
| Internet Security and Privacy | Karlstad University (KAU) | ||
| Ethical Hacking | Karlstad University (KAU) | ||
| Usable Security | Karlstad University (KAU) | ||
| Privacy Enhancing Technologies | Karlstad University (KAU) | ||
| Privacy by Design | Karlstad University (KAU) |
Elective Events
| Course / Event | Credits (hp) | Organizer | Period / Notes |
|---|---|---|---|
| Introduction to Military Cyber Operations | Swedish Defence University (FHS) | ||
| IFIP Summer School on Privacy and Identity Management | IFIP | Summer school |
Section 3: Recommended timeline
Recommended timeline for taking courses
This is a general guideline. Always confirm with your supervisor and local rules at your home university.
- Year 1
- Start with the mandatory cybersecurity courses offered by SIGS-Cybersec.
- Check local requirements for general PhD courses (differ from each University).
- Before licentiate or midterm seminar
- Complete all mandatory courses in cybersecurity listed.
- Ensure you meet your home university’s requirements for general courses.
- Around or after licentiate / midterm seminar
- Select elective courses in cybersecurity that match your research focus and interests.
- Consider summer and winter schools, such as the IFIP Summer School on Privacy and Identity Management, to strengthen your network and deepen specific topics.