BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//127.0.1.1//NONSGML kigkonsult.se iCalcreator 2.41.92//
CALSCALE:GREGORIAN
METHOD:PUBLISH
UID:37623132-3033-4233-b031-356231643531
X-WR-CALNAME:Foundations of Cyber Security II Calendar
X-WR-CALDESC:Events of the lecture Foundations of Cyber Security II
X-WR-TIMEZONE:Europe/Berlin
BEGIN:VEVENT
UID:33663133-3163-4234-b236-386463326266
DTSTAMP:20260409T192746Z
DESCRIPTION:
DTSTART:20220414T120000Z
DTEND:20220414T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 1 - Introduction and Malware
END:VEVENT
BEGIN:VEVENT
UID:35333765-6335-4932-b232-626538653262
DTSTAMP:20260409T192746Z
DESCRIPTION:
DTSTART:20220421T120000Z
DTEND:20220421T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 2 - Operating Systems
END:VEVENT
BEGIN:VEVENT
UID:65653036-3061-4666-b831-363135646331
DTSTAMP:20260409T192746Z
DESCRIPTION:
DTSTART:20220428T120000Z
DTEND:20220428T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 3 - Low-Level Basics
END:VEVENT
BEGIN:VEVENT
UID:35663930-3731-4830-a631-303163333138
DTSTAMP:20260409T192746Z
DESCRIPTION:
DTSTART:20220505T120000Z
DTEND:20220505T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 4 - Memory Corruption - Overflows
END:VEVENT
BEGIN:VEVENT
UID:32633263-3465-4239-b236-376463376636
DTSTAMP:20260409T192746Z
DESCRIPTION:
DTSTART:20220519T120000Z
DTEND:20220519T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 5 - Memory Corruption II & Environment
END:VEVENT
BEGIN:VEVENT
UID:38636666-3165-4762-a161-653130613731
DTSTAMP:20260409T192746Z
DESCRIPTION:
DTSTART:20220602T120000Z
DTEND:20220602T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 6 - Exploits
END:VEVENT
BEGIN:VEVENT
UID:65323336-6136-4230-a436-353236373238
DTSTAMP:20260409T192746Z
DESCRIPTION:
DTSTART:20220609T120000Z
DTEND:20220609T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 7 - Debugging
END:VEVENT
BEGIN:VEVENT
UID:32613534-6463-4163-a461-633734386339
DTSTAMP:20260409T192746Z
DESCRIPTION:
DTSTART:20220623T120000Z
DTEND:20220623T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 8 - Finding Bugs
END:VEVENT
BEGIN:VEVENT
UID:37653863-6635-4135-b063-613633363836
DTSTAMP:20260409T192746Z
DESCRIPTION:
DTSTART:20220630T120000Z
DTEND:20220630T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 9 - Secure C Programming
END:VEVENT
BEGIN:VEVENT
UID:34333830-3864-4234-b239-656631636535
DTSTAMP:20260409T192746Z
DESCRIPTION:
DTSTART:20220707T120000Z
DTEND:20220707T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 10 - Mitigations
END:VEVENT
BEGIN:VEVENT
UID:62643762-3364-4335-a164-353236316366
DTSTAMP:20260409T192746Z
DESCRIPTION:
DTSTART:20220714T120000Z
DTEND:20220714T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 11 - Sandboxing & System Hardening
END:VEVENT
BEGIN:VEVENT
UID:36393838-6462-4232-a232-653263316463
DTSTAMP:20260409T192746Z
DESCRIPTION:
DTSTART:20220721T120000Z
DTEND:20220721T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Lecture 12 - Side Channels
END:VEVENT
BEGIN:VEVENT
UID:65396237-3039-4366-a637-356633316639
DTSTAMP:20260409T192746Z
DESCRIPTION:
DTSTART:20220804T120000Z
DTEND:20220804T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Exam
END:VEVENT
BEGIN:VEVENT
UID:32353836-6639-4661-a436-616661646566
DTSTAMP:20260409T192746Z
DESCRIPTION:
DTSTART:20220908T120000Z
DTEND:20220908T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2022: Re-Exam
END:VEVENT
END:VCALENDAR
