BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//127.0.1.1//NONSGML kigkonsult.se iCalcreator 2.41.92//
CALSCALE:GREGORIAN
METHOD:PUBLISH
UID:61616537-6539-4933-b065-636233656533
X-WR-CALNAME:Foundations of Cybersecurity 2 Calendar
X-WR-CALDESC:Events of the lecture Foundations of Cybersecurity 2
X-WR-TIMEZONE:Europe/Berlin
BEGIN:VEVENT
UID:63396264-6362-4365-b837-366366616534
DTSTAMP:20260407T205617Z
DESCRIPTION:
DTSTART:20240418T120000Z
DTEND:20240418T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2024: Lecture 1 - Introduction and Malware
END:VEVENT
BEGIN:VEVENT
UID:36323234-3633-4536-b137-623835323262
DTSTAMP:20260407T205617Z
DESCRIPTION:
DTSTART:20240425T120000Z
DTEND:20240425T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2024: Lecture 2 - Operating Systems
END:VEVENT
BEGIN:VEVENT
UID:64333130-6236-4139-a264-333965623736
DTSTAMP:20260407T205617Z
DESCRIPTION:
DTSTART:20240502T120000Z
DTEND:20240502T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2024: Lecture 3 - Low-Level Basics
END:VEVENT
BEGIN:VEVENT
UID:35366166-3138-4665-b063-383665626266
DTSTAMP:20260407T205617Z
DESCRIPTION:
DTSTART:20240516T120000Z
DTEND:20240516T120000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2024: Lecture 4 - Memory Corruption - Overflows
END:VEVENT
BEGIN:VEVENT
UID:34343962-3731-4632-b465-663338366661
DTSTAMP:20260407T205617Z
DESCRIPTION:
DTSTART:20240523T120000Z
DTEND:20240523T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2024: Lecture 5 - Memory Corruption II & Environment
END:VEVENT
BEGIN:VEVENT
UID:62643961-3966-4363-a133-643036666463
DTSTAMP:20260407T205617Z
DESCRIPTION:
DTSTART:20240606T120000Z
DTEND:20240606T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2024: Lecture 6 - Exploits
END:VEVENT
BEGIN:VEVENT
UID:33626363-3239-4739-a663-616361366663
DTSTAMP:20260407T205617Z
DESCRIPTION:
DTSTART:20240613T120000Z
DTEND:20240613T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2024: Lecture 7 - Debugging
END:VEVENT
BEGIN:VEVENT
UID:64313530-3533-4238-b131-346639636462
DTSTAMP:20260407T205617Z
DESCRIPTION:
DTSTART:20240620T120000Z
DTEND:20240620T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2024: Lecture 8 - Finding Bugs
END:VEVENT
BEGIN:VEVENT
UID:66313939-6434-4565-a138-663530303965
DTSTAMP:20260407T205617Z
DESCRIPTION:
DTSTART:20240627T120000Z
DTEND:20240627T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2024: Lecture 9 - Secure C Programming
END:VEVENT
BEGIN:VEVENT
UID:62303364-3939-4333-b964-336436333363
DTSTAMP:20260407T205617Z
DESCRIPTION:
DTSTART:20240704T120000Z
DTEND:20240704T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2024: Lecture 10 - Mitigations
END:VEVENT
BEGIN:VEVENT
UID:32323239-3362-4063-b063-623163326130
DTSTAMP:20260407T205617Z
DESCRIPTION:
DTSTART:20240711T120000Z
DTEND:20240711T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2024: Lecture 11 - Sandboxing & System Hardening
END:VEVENT
BEGIN:VEVENT
UID:38373637-3561-4030-b635-323066663330
DTSTAMP:20260407T205617Z
DESCRIPTION:
DTSTART:20240718T120000Z
DTEND:20240718T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2024: Lecture 12 - Side Channels
END:VEVENT
END:VCALENDAR
