BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//127.0.1.1//NONSGML kigkonsult.se iCalcreator 2.41.92//
CALSCALE:GREGORIAN
METHOD:PUBLISH
UID:31386135-6664-4534-b538-633633613765
X-WR-CALNAME:Foundations of Cybersecurity 2 Calendar
X-WR-CALDESC:Events of the lecture Foundations of Cybersecurity 2
X-WR-TIMEZONE:Europe/Berlin
BEGIN:VEVENT
UID:66626336-6531-4761-b838-306465363233
DTSTAMP:20260425T191133Z
DESCRIPTION:
DTSTART:20250410T120000Z
DTEND:20250410T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii25: Introduction
END:VEVENT
BEGIN:VEVENT
UID:33623331-3536-4666-b635-386366663966
DTSTAMP:20260425T191133Z
DESCRIPTION:
DTSTART:20250417T120000Z
DTEND:20250417T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii25: Operating Systems
END:VEVENT
BEGIN:VEVENT
UID:35333464-3635-4135-b865-323430323635
DTSTAMP:20260425T191133Z
DESCRIPTION:
DTSTART:20250424T120000Z
DTEND:20250424T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii25: Low-level Basics
END:VEVENT
BEGIN:VEVENT
UID:30333962-6130-4162-b261-616136613264
DTSTAMP:20260425T191133Z
DESCRIPTION:
DTSTART:20250508T120000Z
DTEND:20250508T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii25: Memory Corruption - Overflows
END:VEVENT
BEGIN:VEVENT
UID:30633264-6561-4632-a561-313733346433
DTSTAMP:20260425T191133Z
DESCRIPTION:
DTSTART:20250515T120000Z
DTEND:20250515T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii25: Memory Corruption II & Environment
END:VEVENT
BEGIN:VEVENT
UID:64383839-6334-4561-b736-656534633261
DTSTAMP:20260425T191133Z
DESCRIPTION:
DTSTART:20250522T120000Z
DTEND:20250522T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii25: Exploits
END:VEVENT
BEGIN:VEVENT
UID:30653637-3832-4363-a162-623035326536
DTSTAMP:20260425T191133Z
DESCRIPTION:
DTSTART:20250605T120000Z
DTEND:20250605T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii25: Debugging
END:VEVENT
BEGIN:VEVENT
UID:34626361-6639-4431-a266-313366346639
DTSTAMP:20260425T191133Z
DESCRIPTION:
DTSTART:20250612T120000Z
DTEND:20250612T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii25: Finding Bugs
END:VEVENT
BEGIN:VEVENT
UID:38316139-3638-4030-a264-613333356335
DTSTAMP:20260425T191133Z
DESCRIPTION:
DTSTART:20250626T120000Z
DTEND:20250626T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii25: Mitigations
END:VEVENT
BEGIN:VEVENT
UID:65356365-3437-4663-b162-333463326536
DTSTAMP:20260425T191133Z
DESCRIPTION:
DTSTART:20250703T120000Z
DTEND:20250703T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii25: Secure Programming
END:VEVENT
BEGIN:VEVENT
UID:64613939-3838-4663-a635-323439316166
DTSTAMP:20260425T191133Z
DESCRIPTION:
DTSTART:20250710T120000Z
DTEND:20250710T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii25: Sandboxing & System Hardening
END:VEVENT
BEGIN:VEVENT
UID:65366361-3162-4738-a236-376136396239
DTSTAMP:20260425T191133Z
DESCRIPTION:
DTSTART:20250717T120000Z
DTEND:20250717T140000Z
LOCATION:E2 2\, Günter-Hotz-Hörsaal
SUMMARY:Cysecii25: Side Channels
END:VEVENT
END:VCALENDAR
