FI:PV222 Security Architectures - Course Information
PV222 Security Architectures
Faculty of InformaticsSpring 2026
- Extent and Intensity
- 1/1/1. 2 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
In-person direct teaching - Teacher(s)
- Dr. Geraint Price (lecturer), prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (deputy)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer) - Guaranteed by
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Wed 15. 4. 8:00–11:00 S108, 14:00–17:00 S108, Thu 16. 4. 14:00–15:50 S215, Fri 17. 4. 8:00–9:50 A218, 14:00–15:50 A218, Wed 22. 4. 8:00–11:00 S108, 14:00–17:00 S108, Thu 23. 4. 14:00–15:50 S215, Fri 24. 4. 8:00–9:50 A218, 14:00–15:50 A218, Wed 29. 4. 8:00–11:00 S108, 14:00–17:00 S108, Thu 30. 4. 14:00–15:50 S215
- Prerequisites
- PV017 IT Security || PV079 Applied Cryptography || PV157 Authentication and AC || IV054 Cryptography and C.Protocols || IA174 Fundaments of Cryptography ||SOUHLAS
Any of the following security/crypto courses: PV017||PV079||PV157||IA174 - Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 18 student(s).
Current registration and enrolment status: enrolled: 16/18, only registered: 0/18, only registered with preference (fields directly associated with the programme): 0/18 - fields of study / plans the course is directly associated with
- there are 37 fields of study the course is directly associated with, display
- Abstract
- This course will cover a number of topics centered around the design and implementation of security architectures. The high-level aim of this course is to discuss the appropriate system design choices, primarily at the conceptual/architectural level, which impact the security of an organisation’s information, along with how the business requirements of an organisation can influence the design and implementation of those security architectures. The core components of the course will cover the following topics: Identity Management; Security Models; Cloud Computing; PCI-DSS; Bring Your Own Device (BYOD).
- Key topics
- This course will cover a number of topics centered around the design and implementation of security architectures. The high-level aim of this course is to discuss the appropriate system design choices, primarily at the conceptual/architectural level, which impact the security of an organisation’s information, along with how the business requirements of an organisation can influence the design and implementation of those security architectures. The core components of the course will cover the following topics: Identity Management; Security Models; Cloud Computing; PCI-DSS; Bring Your Own Device (BYOD).
- Study resources and literature
- GUTMANN, Peter. Cryptographic security architecture : design and verification. Berlin: Springer, 2004, xviii, 320. ISBN 0387953876. info
- Approaches, practices, and methods used in teaching
- Seminars mainly with presentations from the lecturer, supplemented by discussions of problems and case studies with students.
- Method of verifying learning outcomes and course completion requirements
- Colloquial discussion after the last lecture. Homework and active participation in the lectures shall be also considered.
- Language of instruction
- English
- Follow-Up Courses
- Further comments (probably available only in Czech)
- The course is taught once in two years.
- Teacher's information
- Schedule of lectures and examinations will be provided at the start of the Spring 2026 semester.
- Enrolment Statistics (recent)
- Permalink: https://is.muni.cz/course/fi/spring2026/PV222