BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//127.0.1.1//NONSGML kigkonsult.se iCalcreator 2.41.92//
CALSCALE:GREGORIAN
METHOD:PUBLISH
UID:33333263-6565-4366-a264-343932316333
X-WR-CALNAME:Foundations of Cyber Security II Calendar
X-WR-CALDESC:Events of the lecture Foundations of Cyber Security II
X-WR-TIMEZONE:Europe/Berlin
BEGIN:VEVENT
UID:66333763-6434-4237-a231-333235613035
DTSTAMP:20260521T035039Z
DESCRIPTION:
DTSTART:20220414T120000Z
DTEND:20220414T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 1 - Introduction and Malware
END:VEVENT
BEGIN:VEVENT
UID:33346164-6464-4532-a362-393830346562
DTSTAMP:20260521T035039Z
DESCRIPTION:
DTSTART:20220421T120000Z
DTEND:20220421T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 2 - Operating Systems
END:VEVENT
BEGIN:VEVENT
UID:65616130-3230-4531-b637-666636336238
DTSTAMP:20260521T035039Z
DESCRIPTION:
DTSTART:20220428T120000Z
DTEND:20220428T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 3 - Low-Level Basics
END:VEVENT
BEGIN:VEVENT
UID:39643130-3837-4866-a638-393331663663
DTSTAMP:20260521T035039Z
DESCRIPTION:
DTSTART:20220505T120000Z
DTEND:20220505T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 4 - Memory Corruption - Overflows
END:VEVENT
BEGIN:VEVENT
UID:39653764-3439-4730-b134-323564613166
DTSTAMP:20260521T035039Z
DESCRIPTION:
DTSTART:20220519T120000Z
DTEND:20220519T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 5 - Memory Corruption II & Environment
END:VEVENT
BEGIN:VEVENT
UID:61386336-3338-4736-b162-373037363562
DTSTAMP:20260521T035039Z
DESCRIPTION:
DTSTART:20220602T120000Z
DTEND:20220602T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 6 - Exploits
END:VEVENT
BEGIN:VEVENT
UID:62613063-3036-4862-b332-396636646335
DTSTAMP:20260521T035039Z
DESCRIPTION:
DTSTART:20220609T120000Z
DTEND:20220609T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 7 - Debugging
END:VEVENT
BEGIN:VEVENT
UID:39643265-3036-4062-a439-313135386266
DTSTAMP:20260521T035039Z
DESCRIPTION:
DTSTART:20220623T120000Z
DTEND:20220623T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 8 - Finding Bugs
END:VEVENT
BEGIN:VEVENT
UID:34383635-6366-4962-b936-366530353935
DTSTAMP:20260521T035039Z
DESCRIPTION:
DTSTART:20220630T120000Z
DTEND:20220630T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 9 - Secure C Programming
END:VEVENT
BEGIN:VEVENT
UID:64323436-6330-4539-b432-643436356364
DTSTAMP:20260521T035039Z
DESCRIPTION:
DTSTART:20220707T120000Z
DTEND:20220707T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 10 - Mitigations
END:VEVENT
BEGIN:VEVENT
UID:63326662-3935-4362-b066-386264323763
DTSTAMP:20260521T035039Z
DESCRIPTION:
DTSTART:20220714T120000Z
DTEND:20220714T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 11 - Sandboxing & System Hardening
END:VEVENT
BEGIN:VEVENT
UID:64323839-3034-4439-b136-393535333262
DTSTAMP:20260521T035039Z
DESCRIPTION:
DTSTART:20220721T120000Z
DTEND:20220721T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 12 - Side Channels
END:VEVENT
BEGIN:VEVENT
UID:34313934-3036-4630-b133-656236363136
DTSTAMP:20260521T035039Z
DESCRIPTION:
DTSTART:20220804T120000Z
DTEND:20220804T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Exam
END:VEVENT
END:VCALENDAR
