BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//127.0.1.1//NONSGML kigkonsult.se iCalcreator 2.41.92//
CALSCALE:GREGORIAN
METHOD:PUBLISH
UID:63313533-6339-4533-b033-346165333037
X-WR-CALNAME:Foundations of Cybersecurity 2 Calendar
X-WR-CALDESC:Events of the lecture Foundations of Cybersecurity 2
X-WR-TIMEZONE:Europe/Berlin
BEGIN:VEVENT
UID:38303237-6334-4561-b038-306236633165
DTSTAMP:20260524T235020Z
DESCRIPTION:
DTSTART:20250410T120000Z
DTEND:20250410T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Introduction
END:VEVENT
BEGIN:VEVENT
UID:61333831-3233-4063-b035-376130326338
DTSTAMP:20260524T235020Z
DESCRIPTION:
DTSTART:20250417T120000Z
DTEND:20250417T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Operating Systems
END:VEVENT
BEGIN:VEVENT
UID:31356333-3738-4235-b730-356265656333
DTSTAMP:20260524T235020Z
DESCRIPTION:
DTSTART:20250424T120000Z
DTEND:20250424T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Low-level Basics
END:VEVENT
BEGIN:VEVENT
UID:66373931-6338-4861-b830-336664373566
DTSTAMP:20260524T235020Z
DESCRIPTION:
DTSTART:20250508T120000Z
DTEND:20250508T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Memory Corruption - Overflows
END:VEVENT
BEGIN:VEVENT
UID:38336138-6365-4537-a632-613636396636
DTSTAMP:20260524T235020Z
DESCRIPTION:
DTSTART:20250515T120000Z
DTEND:20250515T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Memory Corruption II & Environment
END:VEVENT
BEGIN:VEVENT
UID:66323032-6463-4437-b461-393035313431
DTSTAMP:20260524T235020Z
DESCRIPTION:
DTSTART:20250522T120000Z
DTEND:20250522T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Exploits
END:VEVENT
BEGIN:VEVENT
UID:35643365-6363-4436-b139-646637323566
DTSTAMP:20260524T235020Z
DESCRIPTION:
DTSTART:20250605T120000Z
DTEND:20250605T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Debugging
END:VEVENT
BEGIN:VEVENT
UID:31313565-3838-4334-b564-623361373832
DTSTAMP:20260524T235020Z
DESCRIPTION:
DTSTART:20250612T120000Z
DTEND:20250612T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Finding Bugs
END:VEVENT
BEGIN:VEVENT
UID:36366661-6238-4433-a138-626238633339
DTSTAMP:20260524T235020Z
DESCRIPTION:
DTSTART:20250626T120000Z
DTEND:20250626T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Mitigations
END:VEVENT
BEGIN:VEVENT
UID:32616664-6136-4038-b531-373239623431
DTSTAMP:20260524T235020Z
DESCRIPTION:
DTSTART:20250703T120000Z
DTEND:20250703T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Secure Programming
END:VEVENT
BEGIN:VEVENT
UID:61356161-3364-4233-a436-343764623831
DTSTAMP:20260524T235020Z
DESCRIPTION:
DTSTART:20250710T120000Z
DTEND:20250710T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Sandboxing & System Hardening
END:VEVENT
BEGIN:VEVENT
UID:66383965-3864-4463-b738-396238346537
DTSTAMP:20260524T235020Z
DESCRIPTION:
DTSTART:20250717T120000Z
DTEND:20250717T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Side Channels
END:VEVENT
END:VCALENDAR
