Syllabus

Title
5285 Security and Privacy
Instructors
Sajjad Khan, Ph.D.
Contact details
Type
PI
Weekly hours
2
Language of instruction
Englisch
Registration
02/03/26 to 02/12/26
Registration via LPIS
Notes to the course
Subject(s) Master Programs
Dates
Day Date Time Room
Monday 03/02/26 04:00 PM - 06:00 PM TC.4.05
Monday 03/09/26 04:00 PM - 06:00 PM D4.0.022 (Gruppen-Setting)
Monday 03/16/26 04:00 PM - 06:00 PM D5.0.001
Monday 03/23/26 04:00 PM - 06:00 PM TC.2.01
Monday 04/13/26 04:00 PM - 06:00 PM D5.1.001
Monday 04/20/26 04:00 PM - 06:00 PM TC.2.01
Monday 04/27/26 04:00 PM - 06:00 PM TC.4.05
Monday 05/04/26 04:00 PM - 06:00 PM D4.0.022 (Gruppen-Setting)
Monday 05/11/26 04:00 PM - 06:00 PM TC.2.01
Monday 05/18/26 04:00 PM - 06:00 PM TC.1.02
Monday 06/01/26 04:00 PM - 06:00 PM TC.4.05
Monday 06/08/26 04:00 PM - 06:00 PM TC.2.03
Monday 06/22/26 12:30 PM - 02:30 PM TC.2.01
Contents

This is a graduate level course that is focusing on security and privacy issues in complex socio-cyber-physical systems from the threat modeling perspective. The students will learn and apply a systematic security and privacy threat modeling approach, and at the same time be exposed to and learn about a selection of the standard security and privacy problems, attacks, and development challenges. The course will also expose the students to a selection of the current security and privacy research and development challenges.

Learning outcomes
  1. Be able to identify and fix security and privacy threats
  2. Learn to use practical and actionable tools, techniques, and approaches for security and privacy
  3. Explore the nuances of software-centric security and privacy threat modeling and discover its application to software and systems during the build phase and beyond
  4. Apply threat modeling to improve security and privacy when managing complex systems
  5. Manage potential security and privacy threats using a structured, methodical framework
  6. Discover and discern evolving security and privacy threats
Attendance requirements

According to the examination regulation full attendance is intended for a PI. 80% attendance required to pass the course.

Teaching/learning method(s)

The required textbook for this course is Threat Modeling: Designing for Security, 1st Edition, by Adam Shostack, Wiley, ISBN-13: 978-1118809990. This textbook will be supplemented by a curated selection of additional readings, depending on the specific focus of the course offering

 

Assessment

There will be 5 evaluations:

  1. Project Deliverable 1: Project Idea (Title and Abstract / One-Page Summary), source selected, e.g., GPT, Claude, LLaMA, etc. (Deadline: Monday, 03/16/26, 11:59 PM; 5 marks)
  2. Project Deliverable 2: Background, Introduction, Related Work, and Adversarial Prompting. (Deadline: Monday, 04/27/26, 11:59 PM; 5 marks; Minimum references=15, 5 marks)
  3. Project Deliverable 3: Project report discussion with evaluation and mitigation (Date to be mutually agreed upon between each group and the instructor, 5 marks)
  4. Project Deliverable 4: Complete project report with all sections.   (Deadline: Monday, 06/30/26, 11:59 PM; 25 marks; Total references ≥ 40)
  5. Final Exam Monday 06/22/26 12:30 to 14:30 TC.2.01. 60 Marks

 

Grading Criteria

         Unsatisfactory: ≤ 60%

         Sufficient: > 60 % to ≤ 70 %

         Satisfactory: > 70 % to ≤ 80 %

         Good: > 80 % to ≤ 90 %

         Excellent: > 90 %

 

Readings

Please log in with your WU account to use all functionalities of read!t. For off-campus access to our licensed electronic resources, remember to activate your VPN connection connection. In case you encounter any technical problems or have questions regarding read!t, please feel free to contact the library at readinglists@wu.ac.at.

Other

 

 

Last edited: 2026-02-25



Back