BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//127.0.1.1//NONSGML kigkonsult.se iCalcreator 2.41.92//
CALSCALE:GREGORIAN
METHOD:PUBLISH
UID:64646230-3062-4337-b231-653831323338
X-WR-CALNAME:Foundations of Cybersecurity 2 Calendar
X-WR-CALDESC:Events of the lecture Foundations of Cybersecurity 2
X-WR-TIMEZONE:Europe/Berlin
BEGIN:VEVENT
UID:35376463-6363-4231-b666-396131343562
DTSTAMP:20260425T190948Z
DESCRIPTION:
DTSTART:20250410T120000Z
DTEND:20250410T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Introduction
END:VEVENT
BEGIN:VEVENT
UID:30333766-3034-4261-a438-633139383135
DTSTAMP:20260425T190948Z
DESCRIPTION:
DTSTART:20250417T120000Z
DTEND:20250417T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Operating Systems
END:VEVENT
BEGIN:VEVENT
UID:32323937-3965-4339-a238-396261626530
DTSTAMP:20260425T190948Z
DESCRIPTION:
DTSTART:20250424T120000Z
DTEND:20250424T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Low-level Basics
END:VEVENT
BEGIN:VEVENT
UID:34336430-3930-4564-a638-663635386566
DTSTAMP:20260425T190948Z
DESCRIPTION:
DTSTART:20250508T120000Z
DTEND:20250508T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Memory Corruption - Overflows
END:VEVENT
BEGIN:VEVENT
UID:63666530-6236-4737-a337-313737313931
DTSTAMP:20260425T190948Z
DESCRIPTION:
DTSTART:20250515T120000Z
DTEND:20250515T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Memory Corruption II & Environment
END:VEVENT
BEGIN:VEVENT
UID:30313537-3163-4933-b666-376262633533
DTSTAMP:20260425T190948Z
DESCRIPTION:
DTSTART:20250522T120000Z
DTEND:20250522T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Exploits
END:VEVENT
BEGIN:VEVENT
UID:63653436-6232-4031-a238-383636326265
DTSTAMP:20260425T190948Z
DESCRIPTION:
DTSTART:20250605T120000Z
DTEND:20250605T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Debugging
END:VEVENT
BEGIN:VEVENT
UID:35386132-6266-4563-b166-326532343765
DTSTAMP:20260425T190948Z
DESCRIPTION:
DTSTART:20250612T120000Z
DTEND:20250612T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Finding Bugs
END:VEVENT
BEGIN:VEVENT
UID:35663061-6364-4762-b931-326138636537
DTSTAMP:20260425T190948Z
DESCRIPTION:
DTSTART:20250626T120000Z
DTEND:20250626T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Mitigations
END:VEVENT
BEGIN:VEVENT
UID:66613937-3439-4333-b866-613033663765
DTSTAMP:20260425T190948Z
DESCRIPTION:
DTSTART:20250703T120000Z
DTEND:20250703T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Secure Programming
END:VEVENT
BEGIN:VEVENT
UID:38336137-6133-4165-b036-636266323339
DTSTAMP:20260425T190948Z
DESCRIPTION:
DTSTART:20250710T120000Z
DTEND:20250710T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Sandboxing & System Hardening
END:VEVENT
BEGIN:VEVENT
UID:66646230-3761-4266-a466-373031653236
DTSTAMP:20260425T190948Z
DESCRIPTION:
DTSTART:20250717T120000Z
DTEND:20250717T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Side Channels
END:VEVENT
END:VCALENDAR
