BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//127.0.1.1//NONSGML kigkonsult.se iCalcreator 2.41.92//
CALSCALE:GREGORIAN
METHOD:PUBLISH
UID:33616135-6530-4936-b234-653931616534
X-WR-CALNAME:Foundations of Cybersecurity 2 Calendar
X-WR-CALDESC:Events of the lecture Foundations of Cybersecurity 2
X-WR-TIMEZONE:Europe/Berlin
BEGIN:VEVENT
UID:62376136-3165-4866-b336-356231346334
DTSTAMP:20260415T225326Z
DESCRIPTION:
DTSTART:20230413T120000Z
DTEND:20230413T140000Z
SUMMARY:Lecture 1 - Introduction and Malware
END:VEVENT
BEGIN:VEVENT
UID:62336365-3432-4233-b038-363734373561
DTSTAMP:20260415T225326Z
DESCRIPTION:
DTSTART:20230420T120000Z
DTEND:20230420T140000Z
SUMMARY:Lecture 2 - Operating Systems
END:VEVENT
BEGIN:VEVENT
UID:64346364-6337-4430-a238-653031346462
DTSTAMP:20260415T225326Z
DESCRIPTION:
DTSTART:20230427T120000Z
DTEND:20230427T150000Z
SUMMARY:Lecture 3 - Low-Level Basics
END:VEVENT
BEGIN:VEVENT
UID:34666333-3336-4236-b138-383434666134
DTSTAMP:20260415T225326Z
DESCRIPTION:
DTSTART:20230504T120000Z
DTEND:20230504T140000Z
SUMMARY:Lecture 4 - Memory Corruption - Overflows
END:VEVENT
BEGIN:VEVENT
UID:62383637-3238-4238-b130-393536663337
DTSTAMP:20260415T225326Z
DESCRIPTION:
DTSTART:20230525T120000Z
DTEND:20230525T140000Z
SUMMARY:Lecture 5 - Memory Corruption II & Environment
END:VEVENT
BEGIN:VEVENT
UID:33306661-6238-4933-a362-346532366137
DTSTAMP:20260415T225326Z
DESCRIPTION:
DTSTART:20230601T120000Z
DTEND:20230601T140000Z
SUMMARY:Lecture 6 - Exploits
END:VEVENT
BEGIN:VEVENT
UID:61386264-3933-4439-a466-336533363437
DTSTAMP:20260415T225326Z
DESCRIPTION:
DTSTART:20230615T120000Z
DTEND:20230615T140000Z
SUMMARY:Lecture 7 - Debugging
END:VEVENT
BEGIN:VEVENT
UID:32363566-3063-4661-a666-353865636636
DTSTAMP:20260415T225326Z
DESCRIPTION:
DTSTART:20230622T120000Z
DTEND:20230622T140000Z
SUMMARY:Lecture 8 - Finding Bugs
END:VEVENT
BEGIN:VEVENT
UID:32376661-3039-4434-b437-623266663433
DTSTAMP:20260415T225326Z
DESCRIPTION:
DTSTART:20230629T120000Z
DTEND:20230629T140000Z
SUMMARY:Lecture 9 - Secure C Programming
END:VEVENT
BEGIN:VEVENT
UID:64363335-3365-4761-b663-323531363231
DTSTAMP:20260415T225326Z
DESCRIPTION:
DTSTART:20230706T120000Z
DTEND:20230706T140000Z
SUMMARY:Lecture 10 - Mitigations
END:VEVENT
BEGIN:VEVENT
UID:37313664-3433-4335-a631-613936343730
DTSTAMP:20260415T225326Z
DESCRIPTION:
DTSTART:20230713T120000Z
DTEND:20230713T140000Z
SUMMARY:Lecture 11 - Sandboxing & System Hardening
END:VEVENT
BEGIN:VEVENT
UID:34343930-6231-4831-b232-356664396430
DTSTAMP:20260415T225326Z
DESCRIPTION:
DTSTART:20230720T120000Z
DTEND:20230720T140000Z
SUMMARY:Lecture 12 - Side Channels
END:VEVENT
BEGIN:VEVENT
UID:33326239-6637-4165-a362-623564633066
DTSTAMP:20260415T225326Z
DESCRIPTION:
DTSTART:20230804T120000Z
DTEND:20230804T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Exam
END:VEVENT
BEGIN:VEVENT
UID:33663036-6466-4061-b132-643037663162
DTSTAMP:20260415T225326Z
DESCRIPTION:
DTSTART:20230914T120000Z
DTEND:20230914T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Re-Exam
END:VEVENT
END:VCALENDAR
