Client security architecture 7.5 Credits

Klient säkerhetsarkitektur
Second cycle, A7005E
Course syllabus valid: Spring 2019 Sp 3 - Present
The version indicates the term and period for which this course syllabus is valid. The most recent version of the course syllabus is shown first.

Syllabus established
by Jonny Johansson, HUL SRT 13 Feb 2013

Last revised
by Jonny Johansson, HUL SRT 21 Aug 2018

Education level
Second cycle
Grade scale
Systems Science
Subject group (SCB)
Informatics/Computer and Systems Sciences
Main field of study
Information Security

Entry requirements

The course assumes basic knowledge of Computer Science or Systems Science, 60 ECTS: D0004N Database Systems I, D0005N Database Systems II, D0006N Objectoriented Analysis and Design, D0007N Objectoriented programming, D0019N Software Development with Java, D0020N Information Systems Development, I0005N IT-Design and Systems Thinking, D0006N Design of IT or equal courses.

More information about English language requirements


The selection is based on 20-285 credits

Course Aim

This course will have some material on various clients, such as personal computer clients, mobile phone clients, tablet clients, and web browser clients.

After this course, the student will be able to:

  1. Explain, identity and summarise the fundamental concepts, standards, importance, functions and scope of client security architectures.
  2. Analyse and design client security architecture features and functionality.
  3. Given a scenario, design a client security architecture strategy via the application of an appropriate methodology.
  4. Perform a review of today’s state-of-the-art products in the area of client security architecture.
  5. Perform a review of academic trends and knowledge in the area of client security architecture.
  6. Analyse client security architecture requirements towards an organisation’s security policy.   


    This course covers the basic concepts, standards, purpose and implementation of client security architectures. This course will give a narrow but in-depth focus on client security architectures. From a practical standpoint, the current state of the art is covered, which will assist students in analysing and designing security solutions. Various scenarios will be covered, and a methodology will help students apply the proper security solutions. Trends, from an academic and theoretical standpoint, are covered, which will help the students understand what new functionality will be appearing in the future. There is also a short introduction, covering how to perform research, in order to discover current state-of-the-art solutions and future trends. This course will cover how to analyse client security architecture requirements towards the implementation of an organisational security policy.   


    During the course, students will work on individual tasks and group tasks. For group work, students will collaborate with each other using a variety of collaboration tools. Course material will cover the fundamental concepts, standards, importance, function and scope of client security architectures. Students will need to apply a security methodology when designing a solution to a given security scenario. In order for students to design an appropriate security solution, students will first need to perform some research, to find available security solutions. Students will learn about information security policy, in order to understand the role of client security architecture in the organisational IT infrastructure.

    Lectures will cover current and future client security architectures, analysis and design, a security methodology, research techniques, and how to integrate architecture into an organisation’s security policy.

    Teaching is in English and on the Internet for distance students or on campus for students living here. IT support: Learning management system, e-mail and phone.

    The learning management system is used for delivering course material, information and submissions. Knowledge is shared and created within the course through virtual meetings with teachers and other students for discussions, supervision, teamwork and seminars. Classes for on-campus students will be held on campus. 


    Individual tasks and group tasks, 6 hp (U, G, or VG)
    Written examination, 1.5 hp (U, G, or VG)

    In order for a student to get VG in the whole course, a VG grade must be accomplished in the individual tasks and group tasks and in the written exam.
    For the G grade, a student should achieve a grade G in the individual tasks and group tasks, as well as in the written exam.

    Technical requirements: Access to PC with Windows 7, microphone, web cam and permission to install software. Internet connection, minimum 0,5 Mbps

    Ali Ismail Awad

    Literature. Valid from Spring 2019 Sp 3 (May change until 10 weeks before course start)
    Computer Security: Principles and Practice (4th Global Edition)
    William Stallings and Lawrie Brown
    Hardcover: 800 pages
    Language: English
    Publisher: Pearson Education Limited (Jan 18, 2018)
    ISBN-10: 1292220619
    ISBN-13: 9781292220611

    Course offered by
    Department of Computer Science, Electrical and Space Engineering

    0003Individual tasks and group tasks6.0TG U G VG
    0004Written exam1.5TG U G VG

    Study guidance
    Study guidance for the course is to be found in our learning platform Canvas before the course starts. Students applying for single subject courses get more information in the Welcome letter. You will find the learning platform via My LTU.