BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//127.0.1.1//NONSGML kigkonsult.se iCalcreator 2.41.92//
CALSCALE:GREGORIAN
METHOD:PUBLISH
UID:61343363-3334-4138-b536-376666626464
X-WR-CALNAME:Foundations of Cyber Security II Calendar
X-WR-CALDESC:Events of the lecture Foundations of Cyber Security II
X-WR-TIMEZONE:Europe/Berlin
BEGIN:VEVENT
UID:64326166-6366-4761-b039-333339396338
DTSTAMP:20260430T045304Z
DESCRIPTION:
DTSTART:20220414T120000Z
DTEND:20220414T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 1 - Introduction and Malware
END:VEVENT
BEGIN:VEVENT
UID:31303036-3235-4432-b130-613136363161
DTSTAMP:20260430T045304Z
DESCRIPTION:
DTSTART:20220421T120000Z
DTEND:20220421T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 2 - Operating Systems
END:VEVENT
BEGIN:VEVENT
UID:34626636-6664-4133-a134-633763613563
DTSTAMP:20260430T045304Z
DESCRIPTION:
DTSTART:20220428T120000Z
DTEND:20220428T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 3 - Low-Level Basics
END:VEVENT
BEGIN:VEVENT
UID:37373165-3034-4234-b336-353137393765
DTSTAMP:20260430T045304Z
DESCRIPTION:
DTSTART:20220505T120000Z
DTEND:20220505T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 4 - Memory Corruption - Overflows
END:VEVENT
BEGIN:VEVENT
UID:30646665-6465-4965-a631-636165313534
DTSTAMP:20260430T045304Z
DESCRIPTION:
DTSTART:20220519T120000Z
DTEND:20220519T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 5 - Memory Corruption II & Environment
END:VEVENT
BEGIN:VEVENT
UID:61323236-3765-4131-b537-373566383536
DTSTAMP:20260430T045304Z
DESCRIPTION:
DTSTART:20220602T120000Z
DTEND:20220602T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 6 - Exploits
END:VEVENT
BEGIN:VEVENT
UID:35626362-3531-4564-a232-386462363231
DTSTAMP:20260430T045304Z
DESCRIPTION:
DTSTART:20220609T120000Z
DTEND:20220609T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 7 - Debugging
END:VEVENT
BEGIN:VEVENT
UID:35333939-6438-4666-a534-623964313539
DTSTAMP:20260430T045304Z
DESCRIPTION:
DTSTART:20220623T120000Z
DTEND:20220623T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 8 - Finding Bugs
END:VEVENT
BEGIN:VEVENT
UID:33316431-3132-4239-b865-303939383636
DTSTAMP:20260430T045304Z
DESCRIPTION:
DTSTART:20220630T120000Z
DTEND:20220630T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 9 - Secure C Programming
END:VEVENT
BEGIN:VEVENT
UID:62633635-6530-4830-b161-646566303965
DTSTAMP:20260430T045304Z
DESCRIPTION:
DTSTART:20220707T120000Z
DTEND:20220707T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 10 - Mitigations
END:VEVENT
BEGIN:VEVENT
UID:61623361-6532-4831-b732-383434373837
DTSTAMP:20260430T045304Z
DESCRIPTION:
DTSTART:20220714T120000Z
DTEND:20220714T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 11 - Sandboxing & System Hardening
END:VEVENT
BEGIN:VEVENT
UID:66326532-6436-4237-b764-363465663738
DTSTAMP:20260430T045304Z
DESCRIPTION:
DTSTART:20220721T120000Z
DTEND:20220721T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 12 - Side Channels
END:VEVENT
BEGIN:VEVENT
UID:65333533-3532-4232-a130-323836353164
DTSTAMP:20260430T045304Z
DESCRIPTION:
DTSTART:20220804T120000Z
DTEND:20220804T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Exam
END:VEVENT
BEGIN:VEVENT
UID:31313365-3234-4263-a137-656637366137
DTSTAMP:20260430T045304Z
DESCRIPTION:
DTSTART:20220908T120000Z
DTEND:20220908T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Re-Exam
END:VEVENT
END:VCALENDAR
