Title |
Type |
Location |
Serial |
Start |
End |
All Day |
|
Lecture 2 - Operating Systems |
Lecture |
E2 2, Günter-Hotz-Hörsaal |
|
25.04.24 |
25.04.24 |
No |
|
Lecture 3 - Low-Level Basics |
Lecture |
E2 2, Günter-Hotz-Hörsaal |
|
02.05.24 |
02.05.24 |
No |
|
Lecture 4 - Memory Corruption - Overflows |
Lecture |
E2 2, Günter-Hotz-Hörsaal |
|
16.05.24 |
16.05.24 |
No |
|
Lecture 5 - Memory Corruption II & Environment |
Lecture |
E2 2, Günter-Hotz-Hörsaal |
|
23.05.24 |
23.05.24 |
No |
|
Lecture 6 - Exploits |
Lecture |
E2 2, Günter-Hotz-Hörsaal |
|
06.06.24 |
06.06.24 |
No |
|
Lecture 7 - Debugging |
Lecture |
E2 2, Günter-Hotz-Hörsaal |
|
13.06.24 |
13.06.24 |
No |
|
Lecture 8 - Finding Bugs |
Lecture |
E2 2, Günter-Hotz-Hörsaal |
|
20.06.24 |
20.06.24 |
No |
|
Lecture 9 - Secure C Programming |
Lecture |
E2 2, Günter-Hotz-Hörsaal |
|
27.06.24 |
27.06.24 |
No |
|
Lecture 10 - Mitigations |
Lecture |
E2 2, Günter-Hotz-Hörsaal |
|
04.07.24 |
04.07.24 |
No |
|
Lecture 1 - Introduction and Malware |
Lecture |
E2 2, Günter-Hotz-Hörsaal |
|
18.04.24 |
18.04.24 |
No |
|