BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//127.0.1.1//NONSGML kigkonsult.se iCalcreator 2.41.92//
CALSCALE:GREGORIAN
METHOD:PUBLISH
UID:65656362-3736-4231-a331-383665643534
X-WR-CALNAME:Foundations of Cybersecurity 2 Calendar
X-WR-CALDESC:Events of the lecture Foundations of Cybersecurity 2
X-WR-TIMEZONE:Europe/Berlin
BEGIN:VEVENT
UID:36386661-3035-4836-b438-336534366663
DTSTAMP:20260524T235233Z
DESCRIPTION:
DTSTART:20250410T120000Z
DTEND:20250410T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii25: Introduction
END:VEVENT
BEGIN:VEVENT
UID:37346461-3436-4264-b431-356163396633
DTSTAMP:20260524T235233Z
DESCRIPTION:
DTSTART:20250417T120000Z
DTEND:20250417T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii25: Operating Systems
END:VEVENT
BEGIN:VEVENT
UID:62316466-3534-4432-b436-316536393530
DTSTAMP:20260524T235233Z
DESCRIPTION:
DTSTART:20250424T120000Z
DTEND:20250424T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii25: Low-level Basics
END:VEVENT
BEGIN:VEVENT
UID:35363833-3832-4665-b162-663035636536
DTSTAMP:20260524T235233Z
DESCRIPTION:
DTSTART:20250508T120000Z
DTEND:20250508T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii25: Memory Corruption - Overflows
END:VEVENT
BEGIN:VEVENT
UID:64323334-3533-4330-b065-333565613961
DTSTAMP:20260524T235233Z
DESCRIPTION:
DTSTART:20250515T120000Z
DTEND:20250515T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii25: Memory Corruption II & Environment
END:VEVENT
BEGIN:VEVENT
UID:37393931-3236-4136-b663-316562613233
DTSTAMP:20260524T235233Z
DESCRIPTION:
DTSTART:20250522T120000Z
DTEND:20250522T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii25: Exploits
END:VEVENT
BEGIN:VEVENT
UID:34356131-3664-4637-b934-616438393132
DTSTAMP:20260524T235233Z
DESCRIPTION:
DTSTART:20250605T120000Z
DTEND:20250605T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii25: Debugging
END:VEVENT
BEGIN:VEVENT
UID:39366436-3363-4363-a331-636635323639
DTSTAMP:20260524T235233Z
DESCRIPTION:
DTSTART:20250612T120000Z
DTEND:20250612T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii25: Finding Bugs
END:VEVENT
BEGIN:VEVENT
UID:38323835-3261-4336-b366-303938376530
DTSTAMP:20260524T235233Z
DESCRIPTION:
DTSTART:20250626T120000Z
DTEND:20250626T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii25: Mitigations
END:VEVENT
BEGIN:VEVENT
UID:31656363-3236-4666-b430-346632656530
DTSTAMP:20260524T235233Z
DESCRIPTION:
DTSTART:20250703T120000Z
DTEND:20250703T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii25: Secure Programming
END:VEVENT
BEGIN:VEVENT
UID:62633737-3330-4961-b337-666533346138
DTSTAMP:20260524T235233Z
DESCRIPTION:
DTSTART:20250710T120000Z
DTEND:20250710T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii25: Sandboxing & System Hardening
END:VEVENT
BEGIN:VEVENT
UID:61363431-3164-4161-a265-343934653830
DTSTAMP:20260524T235233Z
DESCRIPTION:
DTSTART:20250717T120000Z
DTEND:20250717T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii25: Side Channels
END:VEVENT
END:VCALENDAR
