BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//127.0.1.1//NONSGML kigkonsult.se iCalcreator 2.41.92//
CALSCALE:GREGORIAN
METHOD:PUBLISH
UID:39633639-6634-4562-b236-663833373632
X-WR-CALNAME:Foundations of Cyber Security II Calendar
X-WR-CALDESC:Events of the lecture Foundations of Cyber Security II
X-WR-TIMEZONE:Europe/Berlin
BEGIN:VEVENT
UID:65313865-3235-4436-a562-653637663865
DTSTAMP:20260430T045314Z
DESCRIPTION:
DTSTART:20220414T120000Z
DTEND:20220414T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Lecture 1 - Introduction and Malware
END:VEVENT
BEGIN:VEVENT
UID:61343032-3564-4139-b738-353365333836
DTSTAMP:20260430T045314Z
DESCRIPTION:
DTSTART:20220421T120000Z
DTEND:20220421T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Lecture 2 - Operating Systems
END:VEVENT
BEGIN:VEVENT
UID:64633762-3434-4138-b762-333665666431
DTSTAMP:20260430T045314Z
DESCRIPTION:
DTSTART:20220428T120000Z
DTEND:20220428T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Lecture 3 - Low-Level Basics
END:VEVENT
BEGIN:VEVENT
UID:39386134-6638-4839-a531-313762646431
DTSTAMP:20260430T045314Z
DESCRIPTION:
DTSTART:20220505T120000Z
DTEND:20220505T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Lecture 4 - Memory Corruption - Overflows
END:VEVENT
BEGIN:VEVENT
UID:33666335-3034-4137-b264-653038343166
DTSTAMP:20260430T045314Z
DESCRIPTION:
DTSTART:20220519T120000Z
DTEND:20220519T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Lecture 5 - Memory Corruption II & Environment
END:VEVENT
BEGIN:VEVENT
UID:65356166-3063-4238-a335-366363356633
DTSTAMP:20260430T045314Z
DESCRIPTION:
DTSTART:20220602T120000Z
DTEND:20220602T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Lecture 6 - Exploits
END:VEVENT
BEGIN:VEVENT
UID:33656633-3939-4961-b662-316661326238
DTSTAMP:20260430T045314Z
DESCRIPTION:
DTSTART:20220609T120000Z
DTEND:20220609T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Lecture 7 - Debugging
END:VEVENT
BEGIN:VEVENT
UID:65393932-3530-4234-b734-316235383039
DTSTAMP:20260430T045314Z
DESCRIPTION:
DTSTART:20220623T120000Z
DTEND:20220623T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Lecture 8 - Finding Bugs
END:VEVENT
BEGIN:VEVENT
UID:62343637-3631-4031-b237-643365376435
DTSTAMP:20260430T045314Z
DESCRIPTION:
DTSTART:20220630T120000Z
DTEND:20220630T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Lecture 9 - Secure C Programming
END:VEVENT
BEGIN:VEVENT
UID:38306138-6230-4839-b830-643366323332
DTSTAMP:20260430T045314Z
DESCRIPTION:
DTSTART:20220707T120000Z
DTEND:20220707T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Lecture 10 - Mitigations
END:VEVENT
BEGIN:VEVENT
UID:65376436-3334-4162-b065-313431356263
DTSTAMP:20260430T045314Z
DESCRIPTION:
DTSTART:20220714T120000Z
DTEND:20220714T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Lecture 11 - Sandboxing & System Hardening
END:VEVENT
BEGIN:VEVENT
UID:35363432-6333-4638-b662-646634323832
DTSTAMP:20260430T045314Z
DESCRIPTION:
DTSTART:20220721T120000Z
DTEND:20220721T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Lecture 12 - Side Channels
END:VEVENT
BEGIN:VEVENT
UID:63353032-3830-4337-b035-336563353639
DTSTAMP:20260430T045314Z
DESCRIPTION:
DTSTART:20220804T120000Z
DTEND:20220804T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Exam
END:VEVENT
BEGIN:VEVENT
UID:31343633-6134-4663-a638-373831343362
DTSTAMP:20260430T045314Z
DESCRIPTION:
DTSTART:20220908T120000Z
DTEND:20220908T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Re-Exam
END:VEVENT
END:VCALENDAR
