 {"id":51,"date":"2023-09-05T09:43:18","date_gmt":"2023-09-05T09:43:18","guid":{"rendered":"https:\/\/sola.kau.se\/sigscybersec\/?page_id=51"},"modified":"2025-12-04T13:50:46","modified_gmt":"2025-12-04T13:50:46","slug":"phd-courses","status":"publish","type":"page","link":"https:\/\/sola.kau.se\/sigscybersec\/phd-courses\/","title":{"rendered":"SIGS Cybersec Doctoral Courses"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Section 1: Intro and how to use this page<\/h2>\n\n\n\n<p>The SIGS Cybersec research school offers a structured portfolio of doctoral courses in cybersecurity. This page summarizes the courses, indicates when they are typically taken, and provides a quick overview so that PhD students can plan their study path efficiently.<\/p>\n\n\n\n<p>There are two main types of courses:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Mandatory courses in cybersecurity<\/strong> organized by SIGS Cybersec.<\/li>\n\n\n\n<li><strong>Elective courses in cybersecurity<\/strong> organized by SIGS Cybersec.<\/li>\n<\/ul>\n\n\n\n<p>Use the summary table below to get a quick overview, then expand the detailed sections for each category.<\/p>\n\n\n\n<p><strong>Note:<\/strong> Each host university maintains its own set of mandatory doctoral courses that students must complete in addition to the SIGS Cybersec offering. These requirements vary between institutions. Students should always consult the official syllabus, study plan, and doctoral regulations of their home university to ensure compliance with local degree requirements.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-dark-gray-color has-alpha-channel-opacity has-dark-gray-background-color has-background is-style-wide\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Section 2: Summary table of courses<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Mandatory Courses in Cybersecurity<\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Course<\/th><th>Credits (hp)<\/th><th>Organizer<\/th><th>Period \/ Notes<\/th><\/tr><\/thead><tbody><tr><td><a href=\"https:\/\/www.kau.se\/files\/2025-03\/7DAV023%20Introduction%20to%20Privacy%20and%20Privacy%20Enhancing%20Technologies%20ht24%20kursplan%20%28eng%29.pdf\">7DAV023 Introduction to Privacy and Privacy Enhancing Technologies<\/a><\/td><td>3<\/td><td>Karlstad University (KAU)<\/td><td>June 2024 (may be given again in 2026)<\/td><\/tr><tr><td>Future Network Security (5G\/6G, IoT)<\/td><td>3<\/td><td>Blekinge Institute of Technology (BTH)<\/td><td>November 2024 \u2013 January 2025<\/td><\/tr><tr><td><a href=\"https:\/\/www.oru.se\/utbildning\/kompetensutveckling-for-yrkesverksamma\/ai\/ai-and-cybersecurity\/\">AI and Cybersecurity<\/a><\/td><td>3<\/td><td>\u00d6rebro University (ORU)<\/td><td>April &#8211; June (every year)<\/td><\/tr><tr><td>Introduction to Ethical Hacking<\/td><td>3<\/td><td>Karlstad University (KAU)<\/td><td>Spring 2025<\/td><\/tr><tr><td><a href=\"https:\/\/www.kau.se\/en\/doktorandkurstorg\/capture-flag-challenges-computer-security\">7DAV010 CTF Challenges<\/a><\/td><td>4<\/td><td>Karlstad University (KAU)<\/td><td>Spring 2025 (ongoing)<\/td><\/tr><tr><td>Security Management and Human Factors<\/td><td>2<\/td><td>Karlstad University (KAU)<\/td><td>June 2025<\/td><\/tr><tr><td>Career Planning<\/td><td>2<\/td><td>Karlstad University (KAU)<\/td><td>Scheduled 2027<\/td><\/tr><tr><td>Innovation and Entrepreneurship<\/td><td>2<\/td><td>Karlstad University (KAU)<\/td><td>Scheduled 2027<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-dark-gray-color has-alpha-channel-opacity has-dark-gray-background-color has-background is-style-wide\" \/>\n\n\n\n<h3 class=\"wp-block-heading\">Elective Courses in Cybersecurity<\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Course<\/th><th>Credits (hp)<\/th><th>Organizer<\/th><th>Period \/ Notes<\/th><\/tr><\/thead><tbody><tr><td>Distributed Security for Future Networks<\/td><td>5<\/td><td>Blekinge Institute of Technology (BTH)<\/td><td>Late Spring 2026<\/td><\/tr><tr><td><a href=\"https:\/\/www.oru.se\/utbildning\/kurser\/kurs\/datateknik-avancerad-niva-cybersakerhet-for-iot-dt726a\">Cybersecurity for the IoT<\/a><\/td><td>3<\/td><td>\u00d6rebro University (ORU)<\/td><td>January &#8211; March (each year)<\/td><\/tr><tr><td><a href=\"https:\/\/www.kau.se\/en\/education\/programmes-and-courses\/courses\/DVAD23\">Internet Security and Privacy<\/a><\/td><td><\/td><td>Karlstad University (KAU)<\/td><td><\/td><\/tr><tr><td><a href=\"https:\/\/www.kau.se\/en\/education\/programmes-and-courses\/courses\/DVAD25\">Ethical Hacking<\/a><\/td><td><\/td><td>Karlstad University (KAU)<\/td><td>MSc course<\/td><\/tr><tr><td><a href=\"https:\/\/www.kau.se\/en\/education\/programmes-and-courses\/courses\/DVAE25\">Usable Security &amp; Privacy<\/a><\/td><td><\/td><td>Karlstad University (KAU)<\/td><td>MSc course, every autum\/winter<\/td><\/tr><tr><td>Privacy Enhancing Technologies<\/td><td><\/td><td>Karlstad University (KAU)<\/td><td>on demand<\/td><\/tr><tr><td><a href=\"https:\/\/www.kau.se\/cs\/pdb\">Privacy by Design<\/a><\/td><td><\/td><td>Karlstad University (KAU)<\/td><td>MOOC <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-dark-gray-color has-alpha-channel-opacity has-dark-gray-background-color has-background is-style-wide\" \/>\n\n\n\n<h3 class=\"wp-block-heading\">Elective Events<\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Course \/ Event<\/th><th>Credits (hp)<\/th><th>Organizer<\/th><th>Period \/ Notes<\/th><\/tr><\/thead><tbody><tr><td><a href=\"https:\/\/www.fhs.se\/en\/student-web\/syllabus.html?query=3FS0001\">Introduction to Military Cyber Operations<\/a><\/td><td>2 hp<\/td><td>Swedish Defence University (FHS)<\/td><td><\/td><\/tr><tr><td><a href=\"https:\/\/ifip-summerschool.github.io\/\">IFIP Summer School on Privacy and Identity Management<\/a><\/td><td>1.5 &#8211; 3  hp<\/td><td>IFIP<\/td><td>Annual Summer school<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-dark-gray-color has-alpha-channel-opacity has-dark-gray-background-color has-background is-style-wide\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Section 3: Recommended timeline<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Recommended timeline for taking courses<\/h3>\n\n\n\n<p>This is a general guideline. Always confirm with your supervisor and local rules at your home university.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Year 1<\/strong>\n<ul class=\"wp-block-list\">\n<li>Start with the <strong>mandatory cybersecurity courses<\/strong> offered by SIGS-Cybersec.<\/li>\n\n\n\n<li>Check local requirements for <strong>general PhD courses<\/strong> (differ from each University).<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Before licentiate or midterm seminar<\/strong>\n<ul class=\"wp-block-list\">\n<li>Complete all <strong>mandatory courses in cybersecurity<\/strong> listed.<\/li>\n\n\n\n<li>Ensure you meet your home university\u2019s requirements for general courses.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Around or after licentiate \/ midterm seminar<\/strong>\n<ul class=\"wp-block-list\">\n<li>Select <strong>elective courses in cybersecurity<\/strong> that match your research focus and interests.<\/li>\n\n\n\n<li>Consider <strong>summer and winter schools<\/strong>, such as the IFIP Summer School on Privacy and Identity Management, to strengthen your network and deepen specific topics.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><\/h2>\n","protected":false},"excerpt":{"rendered":"<p>Section 1: Intro and how to use this page The SIGS Cybersec research school offers a structured portfolio of doctoral courses in cybersecurity. This page summarizes the courses, indicates when they are typically taken, and provides a quick overview so that PhD students can plan their study path efficiently. There are two main types of [&hellip;]<\/p>\n","protected":false},"author":4500,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"template-fullwidth.php","meta":{"footnotes":""},"class_list":["post-51","page","type-page","status-publish","hentry","post-preview"],"_links":{"self":[{"href":"https:\/\/sola.kau.se\/sigscybersec\/wp-json\/wp\/v2\/pages\/51","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sola.kau.se\/sigscybersec\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sola.kau.se\/sigscybersec\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sola.kau.se\/sigscybersec\/wp-json\/wp\/v2\/users\/4500"}],"replies":[{"embeddable":true,"href":"https:\/\/sola.kau.se\/sigscybersec\/wp-json\/wp\/v2\/comments?post=51"}],"version-history":[{"count":36,"href":"https:\/\/sola.kau.se\/sigscybersec\/wp-json\/wp\/v2\/pages\/51\/revisions"}],"predecessor-version":[{"id":372,"href":"https:\/\/sola.kau.se\/sigscybersec\/wp-json\/wp\/v2\/pages\/51\/revisions\/372"}],"wp:attachment":[{"href":"https:\/\/sola.kau.se\/sigscybersec\/wp-json\/wp\/v2\/media?parent=51"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}