BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//127.0.1.1//NONSGML kigkonsult.se iCalcreator 2.41.92//
CALSCALE:GREGORIAN
METHOD:PUBLISH
UID:63666465-6538-4438-b764-666438653337
X-WR-CALNAME:Foundations of Cybersecurity 2 Calendar
X-WR-CALDESC:Events of the lecture Foundations of Cybersecurity 2
X-WR-TIMEZONE:Europe/Berlin
BEGIN:VEVENT
UID:30376265-3438-4764-a431-303432663636
DTSTAMP:20260521T035039Z
DESCRIPTION:
DTSTART:20240418T120000Z
DTEND:20240418T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Lecture 1 - Introduction and Malware
END:VEVENT
BEGIN:VEVENT
UID:31323031-6561-4932-b836-313861316461
DTSTAMP:20260521T035039Z
DESCRIPTION:
DTSTART:20240425T120000Z
DTEND:20240425T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Lecture 2 - Operating Systems
END:VEVENT
BEGIN:VEVENT
UID:38646636-3831-4130-b662-663937306231
DTSTAMP:20260521T035039Z
DESCRIPTION:
DTSTART:20240502T120000Z
DTEND:20240502T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Lecture 3 - Low-Level Basics
END:VEVENT
BEGIN:VEVENT
UID:36616662-3962-4935-b438-663062366435
DTSTAMP:20260521T035039Z
DESCRIPTION:
DTSTART:20240516T120000Z
DTEND:20240516T120000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Lecture 4 - Memory Corruption - Overflows
END:VEVENT
BEGIN:VEVENT
UID:32616335-3337-4265-b662-623533373963
DTSTAMP:20260521T035039Z
DESCRIPTION:
DTSTART:20240523T120000Z
DTEND:20240523T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Lecture 5 - Memory Corruption II & Environment
END:VEVENT
BEGIN:VEVENT
UID:64313630-3564-4735-b436-613231326662
DTSTAMP:20260521T035039Z
DESCRIPTION:
DTSTART:20240606T120000Z
DTEND:20240606T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Lecture 6 - Exploits
END:VEVENT
BEGIN:VEVENT
UID:34356433-3739-4836-a439-333930633036
DTSTAMP:20260521T035039Z
DESCRIPTION:
DTSTART:20240613T120000Z
DTEND:20240613T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Lecture 7 - Debugging
END:VEVENT
BEGIN:VEVENT
UID:39323362-6166-4937-a432-383335656165
DTSTAMP:20260521T035039Z
DESCRIPTION:
DTSTART:20240620T120000Z
DTEND:20240620T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Lecture 8 - Finding Bugs
END:VEVENT
BEGIN:VEVENT
UID:31656136-6263-4135-b736-613635326464
DTSTAMP:20260521T035039Z
DESCRIPTION:
DTSTART:20240627T120000Z
DTEND:20240627T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Lecture 9 - Secure C Programming
END:VEVENT
BEGIN:VEVENT
UID:38663538-3132-4561-a633-326365313338
DTSTAMP:20260521T035039Z
DESCRIPTION:
DTSTART:20240704T120000Z
DTEND:20240704T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Lecture 10 - Mitigations
END:VEVENT
BEGIN:VEVENT
UID:32313433-6166-4138-b335-623637643663
DTSTAMP:20260521T035039Z
DESCRIPTION:
DTSTART:20240711T120000Z
DTEND:20240711T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Lecture 11 - Sandboxing & System Hardening
END:VEVENT
BEGIN:VEVENT
UID:31393361-3565-4138-a536-313462626230
DTSTAMP:20260521T035039Z
DESCRIPTION:
DTSTART:20240718T120000Z
DTEND:20240718T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Lecture 12 - Side Channels
END:VEVENT
END:VCALENDAR
