Secure Computer Systems I
Course, Master's level, 1DT072
Autumn 2024 Autumn 2024, Uppsala, 33%, On-campus, English
- Location
- Uppsala
- Pace of study
- 33%
- Teaching form
- On-campus
- Instructional time
- Daytime
- Study period
- 4 November 2024–19 January 2025
- Language of instruction
- English
- Entry requirements
-
120 credits including 15 credits in mathematics and 30 credits in computer science or technology. Distributed Information Systems or participation in courses with operating systems and computer networks. 10 credits in programming. Proficiency in English equivalent to the Swedish upper secondary course English 6.
- Selection
-
Higher education credits in science and engineering (maximum 240 credits)
- Fees
-
If you are not a citizen of a European Union (EU) or European Economic Area (EEA) country, or Switzerland, you are required to pay application and tuition fees.
- First tuition fee instalment: SEK 12,083
- Total tuition fee: SEK 12,083
- Application deadline
- 15 April 2024
- Application code
- UU-11209
Admitted or on the waiting list?
- Registration period
- 21 October 2024–11 November 2024
- Information on registration from the department
Autumn 2024 Autumn 2024, Uppsala, 33%, On-campus, English For exchange students
- Location
- Uppsala
- Pace of study
- 33%
- Teaching form
- On-campus
- Instructional time
- Daytime
- Study period
- 4 November 2024–19 January 2025
- Language of instruction
- English
- Entry requirements
-
120 credits including 15 credits in mathematics and 30 credits in computer science or technology. Distributed Information Systems or participation in courses with operating systems and computer networks. 10 credits in programming. Proficiency in English equivalent to the Swedish upper secondary course English 6.
Admitted or on the waiting list?
- Registration period
- 21 October 2024–11 November 2024
- Information on registration from the department
About the course
The course is about technical aspects of data security. Basic principles and theoretical models for security, such as identification, authenticity, access control, and information flow control are covered. A goal with the course is to develop an ability to identify weaknesses and strengths in different approaches to handling data security.