BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//127.0.1.1//NONSGML kigkonsult.se iCalcreator 2.41.92//
CALSCALE:GREGORIAN
METHOD:PUBLISH
UID:30376633-3533-4133-b030-393635383332
X-WR-CALNAME:Foundations of Cybersecurity 2 Calendar
X-WR-CALDESC:Events of the lecture Foundations of Cybersecurity 2
X-WR-TIMEZONE:Europe/Berlin
BEGIN:VEVENT
UID:35356264-6131-4739-b739-326131326661
DTSTAMP:20260430T045301Z
DESCRIPTION:
DTSTART:20240418T120000Z
DTEND:20240418T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2024: Lecture 1 - Introduction and Malware
END:VEVENT
BEGIN:VEVENT
UID:39306663-3530-4730-a236-363465386330
DTSTAMP:20260430T045301Z
DESCRIPTION:
DTSTART:20240425T120000Z
DTEND:20240425T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2024: Lecture 2 - Operating Systems
END:VEVENT
BEGIN:VEVENT
UID:35346231-6234-4532-a630-333230366338
DTSTAMP:20260430T045301Z
DESCRIPTION:
DTSTART:20240502T120000Z
DTEND:20240502T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2024: Lecture 3 - Low-Level Basics
END:VEVENT
BEGIN:VEVENT
UID:64353633-3833-4437-a237-376236396138
DTSTAMP:20260430T045301Z
DESCRIPTION:
DTSTART:20240516T120000Z
DTEND:20240516T120000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2024: Lecture 4 - Memory Corruption - Overflows
END:VEVENT
BEGIN:VEVENT
UID:35646535-3137-4330-b866-656135396361
DTSTAMP:20260430T045301Z
DESCRIPTION:
DTSTART:20240523T120000Z
DTEND:20240523T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2024: Lecture 5 - Memory Corruption II & Environment
END:VEVENT
BEGIN:VEVENT
UID:38343761-3131-4233-a533-346533653436
DTSTAMP:20260430T045301Z
DESCRIPTION:
DTSTART:20240606T120000Z
DTEND:20240606T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2024: Lecture 6 - Exploits
END:VEVENT
BEGIN:VEVENT
UID:39386638-6334-4266-a636-633566343137
DTSTAMP:20260430T045301Z
DESCRIPTION:
DTSTART:20240613T120000Z
DTEND:20240613T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2024: Lecture 7 - Debugging
END:VEVENT
BEGIN:VEVENT
UID:65663866-3761-4033-b361-653664353337
DTSTAMP:20260430T045301Z
DESCRIPTION:
DTSTART:20240620T120000Z
DTEND:20240620T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2024: Lecture 8 - Finding Bugs
END:VEVENT
BEGIN:VEVENT
UID:33333230-3461-4862-a663-656530656532
DTSTAMP:20260430T045301Z
DESCRIPTION:
DTSTART:20240627T120000Z
DTEND:20240627T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2024: Lecture 9 - Secure C Programming
END:VEVENT
BEGIN:VEVENT
UID:35383262-6430-4133-b937-393964613265
DTSTAMP:20260430T045301Z
DESCRIPTION:
DTSTART:20240704T120000Z
DTEND:20240704T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2024: Lecture 10 - Mitigations
END:VEVENT
BEGIN:VEVENT
UID:63363163-3161-4638-b935-323038663062
DTSTAMP:20260430T045301Z
DESCRIPTION:
DTSTART:20240711T120000Z
DTEND:20240711T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2024: Lecture 11 - Sandboxing & System Hardening
END:VEVENT
BEGIN:VEVENT
UID:39353563-3938-4232-b166-643130633234
DTSTAMP:20260430T045301Z
DESCRIPTION:
DTSTART:20240718T120000Z
DTEND:20240718T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2024: Lecture 12 - Side Channels
END:VEVENT
END:VCALENDAR
