BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//127.0.1.1//NONSGML kigkonsult.se iCalcreator 2.41.92//
CALSCALE:GREGORIAN
METHOD:PUBLISH
UID:65366538-6366-4534-b466-323734306261
X-WR-CALNAME:Foundations of Cyber Security II Calendar
X-WR-CALDESC:Events of the lecture Foundations of Cyber Security II
X-WR-TIMEZONE:Europe/Berlin
BEGIN:VEVENT
UID:65316539-3462-4438-b337-343232333163
DTSTAMP:20260430T045302Z
DESCRIPTION:
DTSTART:20220414T120000Z
DTEND:20220414T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Lecture 1 - Introduction and Malware
END:VEVENT
BEGIN:VEVENT
UID:61633062-6331-4461-a338-363065663830
DTSTAMP:20260430T045302Z
DESCRIPTION:
DTSTART:20220421T120000Z
DTEND:20220421T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Lecture 2 - Operating Systems
END:VEVENT
BEGIN:VEVENT
UID:63386637-6534-4063-a538-346533353961
DTSTAMP:20260430T045302Z
DESCRIPTION:
DTSTART:20220428T120000Z
DTEND:20220428T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Lecture 3 - Low-Level Basics
END:VEVENT
BEGIN:VEVENT
UID:38663431-6464-4231-a564-316232356337
DTSTAMP:20260430T045302Z
DESCRIPTION:
DTSTART:20220505T120000Z
DTEND:20220505T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Lecture 4 - Memory Corruption - Overflows
END:VEVENT
BEGIN:VEVENT
UID:37643533-3831-4237-b734-313834633830
DTSTAMP:20260430T045302Z
DESCRIPTION:
DTSTART:20220519T120000Z
DTEND:20220519T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Lecture 5 - Memory Corruption II & Environment
END:VEVENT
BEGIN:VEVENT
UID:30366531-3731-4466-b739-376664613435
DTSTAMP:20260430T045302Z
DESCRIPTION:
DTSTART:20220602T120000Z
DTEND:20220602T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Lecture 6 - Exploits
END:VEVENT
BEGIN:VEVENT
UID:31316462-3232-4062-a533-303835616537
DTSTAMP:20260430T045302Z
DESCRIPTION:
DTSTART:20220609T120000Z
DTEND:20220609T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Lecture 7 - Debugging
END:VEVENT
BEGIN:VEVENT
UID:64363333-3966-4361-a134-303134363932
DTSTAMP:20260430T045302Z
DESCRIPTION:
DTSTART:20220623T120000Z
DTEND:20220623T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Lecture 8 - Finding Bugs
END:VEVENT
BEGIN:VEVENT
UID:38666136-3231-4536-b337-636435303632
DTSTAMP:20260430T045302Z
DESCRIPTION:
DTSTART:20220630T120000Z
DTEND:20220630T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Lecture 9 - Secure C Programming
END:VEVENT
BEGIN:VEVENT
UID:65343733-6433-4663-b035-373835643666
DTSTAMP:20260430T045302Z
DESCRIPTION:
DTSTART:20220707T120000Z
DTEND:20220707T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Lecture 10 - Mitigations
END:VEVENT
BEGIN:VEVENT
UID:33313432-3637-4765-b663-613339373933
DTSTAMP:20260430T045302Z
DESCRIPTION:
DTSTART:20220714T120000Z
DTEND:20220714T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Lecture 11 - Sandboxing & System Hardening
END:VEVENT
BEGIN:VEVENT
UID:31366231-3235-4361-b866-303662373331
DTSTAMP:20260430T045302Z
DESCRIPTION:
DTSTART:20220721T120000Z
DTEND:20220721T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Lecture 12 - Side Channels
END:VEVENT
BEGIN:VEVENT
UID:33623931-3162-4535-a533-303030356666
DTSTAMP:20260430T045302Z
DESCRIPTION:
DTSTART:20220804T120000Z
DTEND:20220804T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Exam
END:VEVENT
END:VCALENDAR
