BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//127.0.1.1//NONSGML kigkonsult.se iCalcreator 2.41.92//
CALSCALE:GREGORIAN
METHOD:PUBLISH
UID:32313437-6533-4336-a533-373533303536
X-WR-CALNAME:Foundations of Cyber Security II Calendar
X-WR-CALDESC:Events of the lecture Foundations of Cyber Security II
X-WR-TIMEZONE:Europe/Berlin
BEGIN:VEVENT
UID:39386461-3937-4232-b034-613030643862
DTSTAMP:20260430T045301Z
DESCRIPTION:
DTSTART:20220414T120000Z
DTEND:20220414T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 1 - Introduction and Malware
END:VEVENT
BEGIN:VEVENT
UID:63396130-3432-4561-a134-656531653961
DTSTAMP:20260430T045301Z
DESCRIPTION:
DTSTART:20220421T120000Z
DTEND:20220421T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 2 - Operating Systems
END:VEVENT
BEGIN:VEVENT
UID:31626633-3930-4837-b534-353862393662
DTSTAMP:20260430T045301Z
DESCRIPTION:
DTSTART:20220428T120000Z
DTEND:20220428T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 3 - Low-Level Basics
END:VEVENT
BEGIN:VEVENT
UID:39626163-3135-4433-a362-326131616137
DTSTAMP:20260430T045301Z
DESCRIPTION:
DTSTART:20220505T120000Z
DTEND:20220505T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 4 - Memory Corruption - Overflows
END:VEVENT
BEGIN:VEVENT
UID:66643163-3434-4464-b934-396330333063
DTSTAMP:20260430T045301Z
DESCRIPTION:
DTSTART:20220519T120000Z
DTEND:20220519T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 5 - Memory Corruption II & Environment
END:VEVENT
BEGIN:VEVENT
UID:65313461-6335-4230-a338-366566323134
DTSTAMP:20260430T045301Z
DESCRIPTION:
DTSTART:20220602T120000Z
DTEND:20220602T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 6 - Exploits
END:VEVENT
BEGIN:VEVENT
UID:38353835-6233-4165-b532-643530383761
DTSTAMP:20260430T045301Z
DESCRIPTION:
DTSTART:20220609T120000Z
DTEND:20220609T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 7 - Debugging
END:VEVENT
BEGIN:VEVENT
UID:31633135-3234-4562-a564-353335356338
DTSTAMP:20260430T045301Z
DESCRIPTION:
DTSTART:20220623T120000Z
DTEND:20220623T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 8 - Finding Bugs
END:VEVENT
BEGIN:VEVENT
UID:33306237-3364-4430-a534-303964353436
DTSTAMP:20260430T045301Z
DESCRIPTION:
DTSTART:20220630T120000Z
DTEND:20220630T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 9 - Secure C Programming
END:VEVENT
BEGIN:VEVENT
UID:35303631-6133-4161-b631-393861373331
DTSTAMP:20260430T045301Z
DESCRIPTION:
DTSTART:20220707T120000Z
DTEND:20220707T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 10 - Mitigations
END:VEVENT
BEGIN:VEVENT
UID:32353035-6262-4331-b862-653966626533
DTSTAMP:20260430T045301Z
DESCRIPTION:
DTSTART:20220714T120000Z
DTEND:20220714T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 11 - Sandboxing & System Hardening
END:VEVENT
BEGIN:VEVENT
UID:62633336-3830-4066-a266-306635386139
DTSTAMP:20260430T045301Z
DESCRIPTION:
DTSTART:20220721T120000Z
DTEND:20220721T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 12 - Side Channels
END:VEVENT
BEGIN:VEVENT
UID:35323564-3530-4333-a233-333937316161
DTSTAMP:20260430T045301Z
DESCRIPTION:
DTSTART:20220804T120000Z
DTEND:20220804T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Exam
END:VEVENT
END:VCALENDAR
