BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//127.0.1.1//NONSGML kigkonsult.se iCalcreator 2.41.92//
CALSCALE:GREGORIAN
METHOD:PUBLISH
UID:63613937-3062-4162-a434-376633666165
X-WR-CALNAME:Foundations of Cybersecurity 2 Calendar
X-WR-CALDESC:Events of the lecture Foundations of Cybersecurity 2
X-WR-TIMEZONE:Europe/Berlin
BEGIN:VEVENT
UID:31336533-6337-4739-b135-616333623466
DTSTAMP:20260521T035039Z
DESCRIPTION:
DTSTART:20240418T120000Z
DTEND:20240418T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2024: Lecture 1 - Introduction and Malware
END:VEVENT
BEGIN:VEVENT
UID:62383136-3064-4465-a465-376464303630
DTSTAMP:20260521T035039Z
DESCRIPTION:
DTSTART:20240425T120000Z
DTEND:20240425T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2024: Lecture 2 - Operating Systems
END:VEVENT
BEGIN:VEVENT
UID:63303833-3630-4034-a337-643362623434
DTSTAMP:20260521T035039Z
DESCRIPTION:
DTSTART:20240502T120000Z
DTEND:20240502T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2024: Lecture 3 - Low-Level Basics
END:VEVENT
BEGIN:VEVENT
UID:61313930-6537-4334-b464-363136353861
DTSTAMP:20260521T035039Z
DESCRIPTION:
DTSTART:20240516T120000Z
DTEND:20240516T120000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2024: Lecture 4 - Memory Corruption - Overflows
END:VEVENT
BEGIN:VEVENT
UID:38313733-3938-4264-b166-393933303164
DTSTAMP:20260521T035039Z
DESCRIPTION:
DTSTART:20240523T120000Z
DTEND:20240523T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2024: Lecture 5 - Memory Corruption II & Environment
END:VEVENT
BEGIN:VEVENT
UID:64636331-6266-4236-a261-393035356465
DTSTAMP:20260521T035039Z
DESCRIPTION:
DTSTART:20240606T120000Z
DTEND:20240606T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2024: Lecture 6 - Exploits
END:VEVENT
BEGIN:VEVENT
UID:64663135-3035-4536-a163-366438613737
DTSTAMP:20260521T035039Z
DESCRIPTION:
DTSTART:20240613T120000Z
DTEND:20240613T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2024: Lecture 7 - Debugging
END:VEVENT
BEGIN:VEVENT
UID:36643064-3537-4132-a139-383961343664
DTSTAMP:20260521T035039Z
DESCRIPTION:
DTSTART:20240620T120000Z
DTEND:20240620T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2024: Lecture 8 - Finding Bugs
END:VEVENT
BEGIN:VEVENT
UID:30386439-3833-4566-b261-376432326230
DTSTAMP:20260521T035039Z
DESCRIPTION:
DTSTART:20240627T120000Z
DTEND:20240627T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2024: Lecture 9 - Secure C Programming
END:VEVENT
BEGIN:VEVENT
UID:31326265-3139-4933-b132-613738666161
DTSTAMP:20260521T035039Z
DESCRIPTION:
DTSTART:20240704T120000Z
DTEND:20240704T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2024: Lecture 10 - Mitigations
END:VEVENT
BEGIN:VEVENT
UID:30656464-3831-4239-b934-316236323139
DTSTAMP:20260521T035039Z
DESCRIPTION:
DTSTART:20240711T120000Z
DTEND:20240711T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2024: Lecture 11 - Sandboxing & System Hardening
END:VEVENT
BEGIN:VEVENT
UID:64346663-6438-4336-b062-363865316232
DTSTAMP:20260521T035039Z
DESCRIPTION:
DTSTART:20240718T120000Z
DTEND:20240718T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii2024: Lecture 12 - Side Channels
END:VEVENT
END:VCALENDAR
