BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//127.0.1.1//NONSGML kigkonsult.se iCalcreator 2.41.92//
CALSCALE:GREGORIAN
METHOD:PUBLISH
UID:37363131-3637-4138-b139-393066376462
X-WR-CALNAME:Foundations of Cybersecurity 2 Calendar
X-WR-CALDESC:Events of the lecture Foundations of Cybersecurity 2
X-WR-TIMEZONE:Europe/Berlin
BEGIN:VEVENT
UID:36663636-6265-4032-b861-306562393463
DTSTAMP:20260416T003316Z
DESCRIPTION:
DTSTART:20230413T120000Z
DTEND:20230413T140000Z
SUMMARY:Lecture 1 - Introduction and Malware
END:VEVENT
BEGIN:VEVENT
UID:39623137-3461-4535-b930-373963343865
DTSTAMP:20260416T003316Z
DESCRIPTION:
DTSTART:20230420T120000Z
DTEND:20230420T140000Z
SUMMARY:Lecture 2 - Operating Systems
END:VEVENT
BEGIN:VEVENT
UID:63373338-3462-4364-b363-656131383166
DTSTAMP:20260416T003316Z
DESCRIPTION:
DTSTART:20230427T120000Z
DTEND:20230427T150000Z
SUMMARY:Lecture 3 - Low-Level Basics
END:VEVENT
BEGIN:VEVENT
UID:37333865-3234-4335-a266-613665643166
DTSTAMP:20260416T003316Z
DESCRIPTION:
DTSTART:20230504T120000Z
DTEND:20230504T140000Z
SUMMARY:Lecture 4 - Memory Corruption - Overflows
END:VEVENT
BEGIN:VEVENT
UID:32306661-6630-4934-a433-303038663335
DTSTAMP:20260416T003316Z
DESCRIPTION:
DTSTART:20230525T120000Z
DTEND:20230525T140000Z
SUMMARY:Lecture 5 - Memory Corruption II & Environment
END:VEVENT
BEGIN:VEVENT
UID:33316435-6132-4763-b266-366465323839
DTSTAMP:20260416T003316Z
DESCRIPTION:
DTSTART:20230601T120000Z
DTEND:20230601T140000Z
SUMMARY:Lecture 6 - Exploits
END:VEVENT
BEGIN:VEVENT
UID:36656536-3962-4835-a366-346239313535
DTSTAMP:20260416T003316Z
DESCRIPTION:
DTSTART:20230615T120000Z
DTEND:20230615T140000Z
SUMMARY:Lecture 7 - Debugging
END:VEVENT
BEGIN:VEVENT
UID:63386632-3466-4634-b562-386361326361
DTSTAMP:20260416T003316Z
DESCRIPTION:
DTSTART:20230622T120000Z
DTEND:20230622T140000Z
SUMMARY:Lecture 8 - Finding Bugs
END:VEVENT
BEGIN:VEVENT
UID:30613538-3433-4064-b138-616236366336
DTSTAMP:20260416T003316Z
DESCRIPTION:
DTSTART:20230629T120000Z
DTEND:20230629T140000Z
SUMMARY:Lecture 9 - Secure C Programming
END:VEVENT
BEGIN:VEVENT
UID:63383937-3963-4434-a439-386364353537
DTSTAMP:20260416T003316Z
DESCRIPTION:
DTSTART:20230706T120000Z
DTEND:20230706T140000Z
SUMMARY:Lecture 10 - Mitigations
END:VEVENT
BEGIN:VEVENT
UID:62663164-6365-4061-b166-303162666461
DTSTAMP:20260416T003316Z
DESCRIPTION:
DTSTART:20230713T120000Z
DTEND:20230713T140000Z
SUMMARY:Lecture 11 - Sandboxing & System Hardening
END:VEVENT
BEGIN:VEVENT
UID:33326536-3561-4038-a433-333939633639
DTSTAMP:20260416T003316Z
DESCRIPTION:
DTSTART:20230720T120000Z
DTEND:20230720T140000Z
SUMMARY:Lecture 12 - Side Channels
END:VEVENT
BEGIN:VEVENT
UID:36373764-3163-4062-b862-326331326334
DTSTAMP:20260416T003316Z
DESCRIPTION:
DTSTART:20230804T120000Z
DTEND:20230804T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Exam
END:VEVENT
BEGIN:VEVENT
UID:39616263-6533-4362-b138-386165386562
DTSTAMP:20260416T003316Z
DESCRIPTION:
DTSTART:20230914T120000Z
DTEND:20230914T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Re-Exam
END:VEVENT
END:VCALENDAR
