BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//127.0.1.1//NONSGML kigkonsult.se iCalcreator 2.41.92//
CALSCALE:GREGORIAN
METHOD:PUBLISH
UID:30646662-6562-4633-b662-663636613661
X-WR-CALNAME:Foundations of Cyber Security II Calendar
X-WR-CALDESC:Events of the lecture Foundations of Cyber Security II
X-WR-TIMEZONE:Europe/Berlin
BEGIN:VEVENT
UID:31613932-3461-4765-a337-373432613965
DTSTAMP:20260409T192746Z
DESCRIPTION:
DTSTART:20220414T120000Z
DTEND:20220414T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 1 - Introduction and Malware
END:VEVENT
BEGIN:VEVENT
UID:65373264-3166-4466-b335-356636323338
DTSTAMP:20260409T192746Z
DESCRIPTION:
DTSTART:20220421T120000Z
DTEND:20220421T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 2 - Operating Systems
END:VEVENT
BEGIN:VEVENT
UID:66643761-3434-4535-b863-316439366131
DTSTAMP:20260409T192746Z
DESCRIPTION:
DTSTART:20220428T120000Z
DTEND:20220428T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 3 - Low-Level Basics
END:VEVENT
BEGIN:VEVENT
UID:37336239-6164-4461-a466-316266303738
DTSTAMP:20260409T192746Z
DESCRIPTION:
DTSTART:20220505T120000Z
DTEND:20220505T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 4 - Memory Corruption - Overflows
END:VEVENT
BEGIN:VEVENT
UID:36666663-6664-4538-b665-383763623565
DTSTAMP:20260409T192746Z
DESCRIPTION:
DTSTART:20220519T120000Z
DTEND:20220519T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 5 - Memory Corruption II & Environment
END:VEVENT
BEGIN:VEVENT
UID:30326665-3732-4466-b161-343161333431
DTSTAMP:20260409T192746Z
DESCRIPTION:
DTSTART:20220602T120000Z
DTEND:20220602T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 6 - Exploits
END:VEVENT
BEGIN:VEVENT
UID:65643038-6462-4535-b333-643931316132
DTSTAMP:20260409T192746Z
DESCRIPTION:
DTSTART:20220609T120000Z
DTEND:20220609T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 7 - Debugging
END:VEVENT
BEGIN:VEVENT
UID:65323834-6634-4061-a163-626430613834
DTSTAMP:20260409T192746Z
DESCRIPTION:
DTSTART:20220623T120000Z
DTEND:20220623T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 8 - Finding Bugs
END:VEVENT
BEGIN:VEVENT
UID:31643537-6531-4261-a337-343531373730
DTSTAMP:20260409T192746Z
DESCRIPTION:
DTSTART:20220630T120000Z
DTEND:20220630T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 9 - Secure C Programming
END:VEVENT
BEGIN:VEVENT
UID:30386639-3564-4266-a635-336137643935
DTSTAMP:20260409T192746Z
DESCRIPTION:
DTSTART:20220707T120000Z
DTEND:20220707T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 10 - Mitigations
END:VEVENT
BEGIN:VEVENT
UID:30323739-6466-4634-a561-353662343461
DTSTAMP:20260409T192746Z
DESCRIPTION:
DTSTART:20220714T120000Z
DTEND:20220714T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 11 - Sandboxing & System Hardening
END:VEVENT
BEGIN:VEVENT
UID:64353832-6466-4335-b830-366362336539
DTSTAMP:20260409T192746Z
DESCRIPTION:
DTSTART:20220721T120000Z
DTEND:20220721T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 12 - Side Channels
END:VEVENT
BEGIN:VEVENT
UID:33306238-6461-4164-a135-363233646535
DTSTAMP:20260409T192746Z
DESCRIPTION:
DTSTART:20220804T120000Z
DTEND:20220804T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Exam
END:VEVENT
END:VCALENDAR
