 {"id":67,"date":"2023-09-05T09:43:18","date_gmt":"2023-09-05T09:43:18","guid":{"rendered":"https:\/\/sola.kau.se\/sigscybersec\/forskarutbildningskurser\/"},"modified":"2026-03-05T15:23:42","modified_gmt":"2026-03-05T15:23:42","slug":"forskarutbildningskurser","status":"publish","type":"page","link":"https:\/\/sola.kau.se\/sigscybersec\/forskarutbildningskurser\/?lang=sv","title":{"rendered":"Forskarutbildningskurser"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Avsnitt 1: Introduktion och hur du anv\u00e4nder denna sida<\/h2>\n\n\n\n<p>SIGS Cybersec forskningsskola erbjuder ett strukturerat utbud av doktorandkurser inom cybers\u00e4kerhet. Denna sida sammanfattar kurserna, anger n\u00e4r de vanligtvis l\u00e4ses och ger en snabb \u00f6versikt s\u00e5 att doktorander kan planera sin studieg\u00e5ng p\u00e5 ett effektivt s\u00e4tt.<\/p>\n\n\n\n<p>Det finns tv\u00e5 huvudtyper av kurser:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Obligatoriska kurser i cybers\u00e4kerhet som anordnas av SIGS Cybersec.<\/li>\n\n\n\n<li>Valbara kurser i cybers\u00e4kerhet organiserade av SIGS Cybersec. <\/li>\n<\/ul>\n\n\n\n<p>Anv\u00e4nd tabellen nedan f\u00f6r att f\u00e5 en snabb \u00f6versikt och expandera sedan de detaljerade avsnitten f\u00f6r varje kategori.<\/p>\n\n\n\n<p><strong>Obs<\/strong>! Varje v\u00e4rduniversitet har sina egna obligatoriska doktorandkurser som doktoranderna m\u00e5ste genomf\u00f6ra ut\u00f6ver SIGS CyberSec-utbudet. Dessa krav varierar mellan institutionerna. Studenterna b\u00f6r alltid st\u00e4mma av den officiella kursplanen, studieplanen och doktorandreglerna vid sitt hemuniversitet f\u00f6r att s\u00e4kerst\u00e4lla att de uppfyller de lokala examenskraven.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-dark-gray-color has-alpha-channel-opacity has-dark-gray-background-color has-background is-style-wide\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Avsnitt 2: Sammanfattande tabell \u00f6ver kurser<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Obligatoriska kurser i cybers\u00e4kerhet<\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th class=\"has-text-align-left\" data-align=\"left\">Kurs<\/th><th class=\"has-text-align-center\" data-align=\"center\">Po\u00e4ng (hp)<\/th><th class=\"has-text-align-left\" data-align=\"left\">L\u00e4ros\u00e4te<\/th><th>Period \/ Kommentar<\/th><\/tr><\/thead><tbody><tr><td class=\"has-text-align-left\" data-align=\"left\"><a href=\"https:\/\/www.kau.se\/files\/2025-03\/7DAV023%20Introduction%20to%20Privacy%20and%20Privacy%20Enhancing%20Technologies%20ht24%20kursplan%20%28eng%29.pdf\">7DAV023 &#8211; Introduktion till integritet och integritetsskyddande teknologier <\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">3<\/td><td class=\"has-text-align-left\" data-align=\"left\">Karlstads universitet (KAU)<\/td><td>Juni 2024 (kan ges igen 2026)<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">Future Network Security (5G\/6G, IoT)<\/td><td class=\"has-text-align-center\" data-align=\"center\">3<\/td><td class=\"has-text-align-left\" data-align=\"left\">Blekinge Tekniska H\u00f6gskola (BTH)<\/td><td>November 2024 \u2013 Januari 2025<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\"><a href=\"https:\/\/www.oru.se\/utbildning\/kompetensutveckling-for-yrkesverksamma\/ai\/ai-and-cybersecurity\/\">AI and Cybersecurity<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">3<\/td><td class=\"has-text-align-left\" data-align=\"left\">\u00d6rebro University (ORU)<\/td><td>April &#8211; Juni (varje \u00e5r)<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">Introduktion till Etisk Hacking<\/td><td class=\"has-text-align-center\" data-align=\"center\">3<\/td><td class=\"has-text-align-left\" data-align=\"left\">Karlstads universitet (KAU)<\/td><td>V\u00e5ren 2025<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\"><a href=\"https:\/\/www.kau.se\/en\/doktorandkurstorg\/capture-flag-challenges-computer-security\">7DAV010 CTF Challenges<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">4<\/td><td class=\"has-text-align-left\" data-align=\"left\">Karlstads universitet (KAU)<\/td><td>V\u00e5ren 2025 (p\u00e5g\u00e5r)<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">Security Management and Human Factors<\/td><td class=\"has-text-align-center\" data-align=\"center\">2<\/td><td class=\"has-text-align-left\" data-align=\"left\">Karlstad Karlstads universitet (KAU)<\/td><td>Juni 2025<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">Karri\u00e4rplanering<\/td><td class=\"has-text-align-center\" data-align=\"center\">2<\/td><td class=\"has-text-align-left\" data-align=\"left\">Karlstads universitet (KAU)<\/td><td>Planerad 2027<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">Innovation and entrepren\u00f6rsskap<\/td><td class=\"has-text-align-center\" data-align=\"center\">2<\/td><td class=\"has-text-align-left\" data-align=\"left\">Karlstad UKarlstads universitet (KAU)<\/td><td>Planerad 2027<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-dark-gray-color has-alpha-channel-opacity has-dark-gray-background-color has-background is-style-wide\" \/>\n\n\n\n<h3 class=\"wp-block-heading\">Valbara kurser i Cybers\u00e4kerhet<\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th class=\"has-text-align-left\" data-align=\"left\">Kurs<\/th><th class=\"has-text-align-center\" data-align=\"center\">Po\u00e4ng (hp)<\/th><th class=\"has-text-align-left\" data-align=\"left\">L\u00e4ros\u00e4te<\/th><th class=\"has-text-align-left\" data-align=\"left\">Kommentar<\/th><\/tr><\/thead><tbody><tr><td class=\"has-text-align-left\" data-align=\"left\">Distributed Security for Future Networks<\/td><td class=\"has-text-align-center\" data-align=\"center\">5<\/td><td class=\"has-text-align-left\" data-align=\"left\">Blekinge Tekniska H\u00f6gskola (BTH)<\/td><td class=\"has-text-align-left\" data-align=\"left\">Sen v\u00e5r 2026<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\"><a href=\"https:\/\/www.oru.se\/utbildning\/kurser\/kurs\/datateknik-avancerad-niva-cybersakerhet-for-iot-dt726a\">Cybers\u00e4kerhet f\u00f6r IoT<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">3<\/td><td class=\"has-text-align-left\" data-align=\"left\">\u00d6rebro Universitet (ORU)<\/td><td class=\"has-text-align-left\" data-align=\"left\">Januari &#8211; Mars (varje \u00e5r)<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\"><a href=\"https:\/\/www.kau.se\/en\/education\/programmes-and-courses\/courses\/DVAD23\">S\u00e4kerhet och integritet p\u00e5 internet<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><td class=\"has-text-align-left\" data-align=\"left\">Karlstads universitet (KAU)<\/td><td class=\"has-text-align-left\" data-align=\"left\"><\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\"><a href=\"https:\/\/www.kau.se\/en\/education\/programmes-and-courses\/courses\/DVAD25\">Etisk hackning<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><td class=\"has-text-align-left\" data-align=\"left\">Karlstads universitet (KAU)<\/td><td class=\"has-text-align-left\" data-align=\"left\">Kurs p\u00e5 masterniv\u00e5<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\"><a href=\"https:\/\/www.kau.se\/en\/education\/programmes-and-courses\/courses\/DVAE25\">Anv\u00e4ndbar s\u00e4kerhet och integritet<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><td class=\"has-text-align-left\" data-align=\"left\"><br>Karlstads universitet (KAU)<\/td><td class=\"has-text-align-left\" data-align=\"left\">Masterniv\u00e5, varje h\u00f6st\/vinter<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">Privacy Enhancing Technologies<\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><td class=\"has-text-align-left\" data-align=\"left\"><br>Karlstads universitet (KAU)<\/td><td class=\"has-text-align-left\" data-align=\"left\">Vid behov<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\"><a href=\"https:\/\/www.kau.se\/cs\/pdb\">Privacy by Design<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><td class=\"has-text-align-left\" data-align=\"left\"><br>Karlstads universitet (KAU)<\/td><td class=\"has-text-align-left\" data-align=\"left\">MOOC <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-dark-gray-color has-alpha-channel-opacity has-dark-gray-background-color has-background is-style-wide\" \/>\n\n\n\n<h3 class=\"wp-block-heading\">Valfria event<\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th class=\"has-text-align-left\" data-align=\"left\">Kurs\/event<\/th><th class=\"has-text-align-center\" data-align=\"center\">Po\u00e4ng (hp)<\/th><th class=\"has-text-align-left\" data-align=\"left\">L\u00e4ros\u00e4te<\/th><th class=\"has-text-align-left\" data-align=\"left\">Kommentar<\/th><\/tr><\/thead><tbody><tr><td class=\"has-text-align-left\" data-align=\"left\"><a href=\"https:\/\/www.fhs.se\/en\/student-web\/syllabus.html?query=3FS0001\">Introduktion till milit\u00e4ra cyberoperationer<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">2 hp<\/td><td class=\"has-text-align-left\" data-align=\"left\">F\u00f6rsvarsh\u00f6gskolan (FHS)<\/td><td class=\"has-text-align-left\" data-align=\"left\"><\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\"><a href=\"https:\/\/ifip-summerschool.github.io\/\">IFIP Summer School on Privacy and Identity Management<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">1.5 &#8211; 3  hp<\/td><td class=\"has-text-align-left\" data-align=\"left\">IFIP<\/td><td class=\"has-text-align-left\" data-align=\"left\">Sommarskola, \u00e5rligen<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-dark-gray-color has-alpha-channel-opacity has-dark-gray-background-color has-background is-style-wide\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Avsnitt 3: Rekommenderad tidsplan<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Rekommenderad tidsplan f\u00f6r kurser<\/h3>\n\n\n\n<p>Detta \u00e4r en allm\u00e4n riktlinje. Kontrollera alltid med din handledare och lokala regler vid ditt hemuniversitet..<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>\u00c5r 1<\/strong>\n<ul class=\"wp-block-list\">\n<li>B\u00f6rja med de obligatoriska kurserna i cybers\u00e4kerhet som erbjuds av SIGS-CyberSec.<\/li>\n\n\n\n<li>Kontrollera lokala krav f\u00f6r allm\u00e4nna doktorandkurser (skiljer sig \u00e5t mellan olika universitet).<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>F\u00f6re licentiat- eller halvtidseminarium<\/strong>\n<ul class=\"wp-block-list\">\n<li>Slutf\u00f6r alla obligatoriska kurser i cybers\u00e4kerhet som anges.<\/li>\n\n\n\n<li>Se till att du uppfyller ditt hemuniversitets krav f\u00f6r allm\u00e4nna kurser.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Omkring eller efter licentiat-\/halvtidseminarium<\/strong>\n<ul class=\"wp-block-list\">\n<li>V\u00e4lj <strong>valbara kurser i cybers\u00e4kerhet<\/strong> som matchar ditt forskningsfokus och dina intressen.<\/li>\n\n\n\n<li>\u00d6verv\u00e4g <strong>sommar- och vinterskolor<\/strong>, s\u00e5som IFIP Summer School on Privacy and Identity Management, f\u00f6r att st\u00e4rka ditt n\u00e4tverk och f\u00f6rdjupa dig i specifika \u00e4mnen.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Avsnitt 1: Introduktion och hur du anv\u00e4nder denna sida SIGS Cybersec forskningsskola erbjuder ett strukturerat utbud av doktorandkurser inom cybers\u00e4kerhet. Denna sida sammanfattar kurserna, anger n\u00e4r de vanligtvis l\u00e4ses och ger en snabb \u00f6versikt s\u00e5 att doktorander kan planera sin studieg\u00e5ng p\u00e5 ett effektivt s\u00e4tt. Det finns tv\u00e5 huvudtyper av kurser: Anv\u00e4nd tabellen nedan f\u00f6r [&hellip;]<\/p>\n","protected":false},"author":4500,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"template-fullwidth.php","meta":{"footnotes":""},"class_list":["post-67","page","type-page","status-publish","hentry","post-preview"],"_links":{"self":[{"href":"https:\/\/sola.kau.se\/sigscybersec\/wp-json\/wp\/v2\/pages\/67","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sola.kau.se\/sigscybersec\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sola.kau.se\/sigscybersec\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sola.kau.se\/sigscybersec\/wp-json\/wp\/v2\/users\/4500"}],"replies":[{"embeddable":true,"href":"https:\/\/sola.kau.se\/sigscybersec\/wp-json\/wp\/v2\/comments?post=67"}],"version-history":[{"count":20,"href":"https:\/\/sola.kau.se\/sigscybersec\/wp-json\/wp\/v2\/pages\/67\/revisions"}],"predecessor-version":[{"id":464,"href":"https:\/\/sola.kau.se\/sigscybersec\/wp-json\/wp\/v2\/pages\/67\/revisions\/464"}],"wp:attachment":[{"href":"https:\/\/sola.kau.se\/sigscybersec\/wp-json\/wp\/v2\/media?parent=67"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}