BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//127.0.1.1//NONSGML kigkonsult.se iCalcreator 2.41.92//
CALSCALE:GREGORIAN
METHOD:PUBLISH
UID:38373436-3738-4464-a464-366538323435
X-WR-CALNAME:Foundations of Cyber Security II Calendar
X-WR-CALDESC:Events of the lecture Foundations of Cyber Security II
X-WR-TIMEZONE:Europe/Berlin
BEGIN:VEVENT
UID:31333237-6362-4161-b162-333063666634
DTSTAMP:20260409T211340Z
DESCRIPTION:
DTSTART:20220414T120000Z
DTEND:20220414T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Lecture 1 - Introduction and Malware
END:VEVENT
BEGIN:VEVENT
UID:35373336-6662-4536-b139-343634353233
DTSTAMP:20260409T211340Z
DESCRIPTION:
DTSTART:20220421T120000Z
DTEND:20220421T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Lecture 2 - Operating Systems
END:VEVENT
BEGIN:VEVENT
UID:36383430-6130-4235-b665-383261636664
DTSTAMP:20260409T211340Z
DESCRIPTION:
DTSTART:20220428T120000Z
DTEND:20220428T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Lecture 3 - Low-Level Basics
END:VEVENT
BEGIN:VEVENT
UID:61316437-6465-4566-b064-653464373336
DTSTAMP:20260409T211340Z
DESCRIPTION:
DTSTART:20220505T120000Z
DTEND:20220505T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Lecture 4 - Memory Corruption - Overflows
END:VEVENT
BEGIN:VEVENT
UID:38323864-3736-4361-b837-643430316630
DTSTAMP:20260409T211340Z
DESCRIPTION:
DTSTART:20220519T120000Z
DTEND:20220519T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Lecture 5 - Memory Corruption II & Environment
END:VEVENT
BEGIN:VEVENT
UID:63633066-6537-4632-a531-313231613637
DTSTAMP:20260409T211340Z
DESCRIPTION:
DTSTART:20220602T120000Z
DTEND:20220602T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Lecture 6 - Exploits
END:VEVENT
BEGIN:VEVENT
UID:65366165-6531-4138-b836-616365613933
DTSTAMP:20260409T211340Z
DESCRIPTION:
DTSTART:20220609T120000Z
DTEND:20220609T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Lecture 7 - Debugging
END:VEVENT
BEGIN:VEVENT
UID:61633161-3765-4362-b233-623130316532
DTSTAMP:20260409T211340Z
DESCRIPTION:
DTSTART:20220623T120000Z
DTEND:20220623T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Lecture 8 - Finding Bugs
END:VEVENT
BEGIN:VEVENT
UID:32333732-3535-4833-a434-323933643837
DTSTAMP:20260409T211340Z
DESCRIPTION:
DTSTART:20220630T120000Z
DTEND:20220630T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Lecture 9 - Secure C Programming
END:VEVENT
BEGIN:VEVENT
UID:34313465-3432-4565-b731-633863636333
DTSTAMP:20260409T211340Z
DESCRIPTION:
DTSTART:20220707T120000Z
DTEND:20220707T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Lecture 10 - Mitigations
END:VEVENT
BEGIN:VEVENT
UID:36643038-3033-4765-b662-336464303337
DTSTAMP:20260409T211340Z
DESCRIPTION:
DTSTART:20220714T120000Z
DTEND:20220714T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Lecture 11 - Sandboxing & System Hardening
END:VEVENT
BEGIN:VEVENT
UID:33343363-3765-4930-a238-643366363564
DTSTAMP:20260409T211340Z
DESCRIPTION:
DTSTART:20220721T120000Z
DTEND:20220721T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Lecture 12 - Side Channels
END:VEVENT
BEGIN:VEVENT
UID:35626266-6137-4230-b837-623537653736
DTSTAMP:20260409T211340Z
DESCRIPTION:
DTSTART:20220804T120000Z
DTEND:20220804T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Exam
END:VEVENT
BEGIN:VEVENT
UID:65303335-3839-4430-b565-303638326537
DTSTAMP:20260409T211340Z
DESCRIPTION:
DTSTART:20220908T120000Z
DTEND:20220908T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Re-Exam
END:VEVENT
END:VCALENDAR
