BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//127.0.1.1//NONSGML kigkonsult.se iCalcreator 2.41.92//
CALSCALE:GREGORIAN
METHOD:PUBLISH
UID:62316362-3861-4864-b562-363164663633
X-WR-CALNAME:Foundations of Cybersecurity 2 Calendar
X-WR-CALDESC:Events of the lecture Foundations of Cybersecurity 2
X-WR-TIMEZONE:Europe/Berlin
BEGIN:VEVENT
UID:31303033-3638-4239-b038-353839633663
DTSTAMP:20260407T222926Z
DESCRIPTION:
DTSTART:20240418T120000Z
DTEND:20240418T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2024: Lecture 1 - Introduction and Malware
END:VEVENT
BEGIN:VEVENT
UID:38353931-3035-4463-a336-303866643466
DTSTAMP:20260407T222926Z
DESCRIPTION:
DTSTART:20240425T120000Z
DTEND:20240425T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2024: Lecture 2 - Operating Systems
END:VEVENT
BEGIN:VEVENT
UID:63356265-6166-4431-b136-393235336662
DTSTAMP:20260407T222926Z
DESCRIPTION:
DTSTART:20240502T120000Z
DTEND:20240502T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2024: Lecture 3 - Low-Level Basics
END:VEVENT
BEGIN:VEVENT
UID:36316562-3239-4263-b836-366536353839
DTSTAMP:20260407T222926Z
DESCRIPTION:
DTSTART:20240516T120000Z
DTEND:20240516T120000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2024: Lecture 4 - Memory Corruption - Overflows
END:VEVENT
BEGIN:VEVENT
UID:62383063-3335-4566-b137-353132656364
DTSTAMP:20260407T222926Z
DESCRIPTION:
DTSTART:20240523T120000Z
DTEND:20240523T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2024: Lecture 5 - Memory Corruption II & Environment
END:VEVENT
BEGIN:VEVENT
UID:38666636-3038-4233-a633-363764353334
DTSTAMP:20260407T222926Z
DESCRIPTION:
DTSTART:20240606T120000Z
DTEND:20240606T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2024: Lecture 6 - Exploits
END:VEVENT
BEGIN:VEVENT
UID:33616464-3166-4631-b936-653336626133
DTSTAMP:20260407T222926Z
DESCRIPTION:
DTSTART:20240613T120000Z
DTEND:20240613T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2024: Lecture 7 - Debugging
END:VEVENT
BEGIN:VEVENT
UID:62353433-6339-4163-a665-323237383839
DTSTAMP:20260407T222926Z
DESCRIPTION:
DTSTART:20240620T120000Z
DTEND:20240620T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2024: Lecture 8 - Finding Bugs
END:VEVENT
BEGIN:VEVENT
UID:30656630-3635-4762-b765-666238303037
DTSTAMP:20260407T222926Z
DESCRIPTION:
DTSTART:20240627T120000Z
DTEND:20240627T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2024: Lecture 9 - Secure C Programming
END:VEVENT
BEGIN:VEVENT
UID:31393565-3839-4863-b661-333838303738
DTSTAMP:20260407T222926Z
DESCRIPTION:
DTSTART:20240704T120000Z
DTEND:20240704T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2024: Lecture 10 - Mitigations
END:VEVENT
BEGIN:VEVENT
UID:33653862-6331-4231-b163-656132653939
DTSTAMP:20260407T222926Z
DESCRIPTION:
DTSTART:20240711T120000Z
DTEND:20240711T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2024: Lecture 11 - Sandboxing & System Hardening
END:VEVENT
BEGIN:VEVENT
UID:31653830-3734-4438-b865-336638643630
DTSTAMP:20260407T222926Z
DESCRIPTION:
DTSTART:20240718T120000Z
DTEND:20240718T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2024: Lecture 12 - Side Channels
END:VEVENT
END:VCALENDAR
