Timetable
Title | Type | Location | Serial | Start | End | All Day | |
---|---|---|---|---|---|---|---|
Tutorial #1 | Tutorial | SR014 (E 1 3) | 1 | 02.06.25 | 02.06.25 | No | |
Tutorial #3 | Tutorial | HS003 (E 1 3) | 3 | 28.05.25 | 28.05.25 | No | |
Tutorial #2 | Tutorial | SR014 (E 1 3) | 2 | 27.05.25 | 27.05.25 | No | |
Tutorial #1 | Tutorial | SR014 (E 1 3) | 1 | 26.05.25 | 26.05.25 | No | |
Exploits | Lecture | E2 2, Günter-Hotz-Hörsaal | 22.05.25 | 22.05.25 | No | ||
Tutorial #3 | Tutorial | HS003 (E 1 3) | 3 | 21.05.25 | 21.05.25 | No | |
Tutorial #2 | Tutorial | SR014 (E 1 3) | 2 | 20.05.25 | 20.05.25 | No | |
Tutorial #1 | Tutorial | SR014 (E 1 3) | 1 | 19.05.25 | 19.05.25 | No | |
Memory Corruption II & Environment | Lecture | E2 2, Günter-Hotz-Hörsaal | 15.05.25 | 15.05.25 | No | ||
Tutorial #3 | Tutorial | HS003 (E 1 3) | 3 | 14.05.25 | 14.05.25 | No | |
Tutorial #2 | Tutorial | SR014 (E 1 3) | 2 | 13.05.25 | 13.05.25 | No | |
Tutorial #1 | Tutorial | SR014 (E 1 3) | 1 | 12.05.25 | 12.05.25 | No | |
Memory Corruption - Overflows | Lecture | E2 2, Günter-Hotz-Hörsaal | 08.05.25 | 08.05.25 | No | ||
Tutorial #3 | Tutorial | HS003 (E 1 3) | 3 | 07.05.25 | 07.05.25 | No | |
Tutorial #2 | Tutorial | SR014 (E 1 3) | 2 | 06.05.25 | 06.05.25 | No | |
Tutorial #1 | Tutorial | SR014 (E 1 3) | 1 | 05.05.25 | 05.05.25 | No | |
Tutorial #3 | Tutorial | HS003 (E 1 3) | 3 | 30.04.25 | 30.04.25 | No | |
Tutorial #2 | Tutorial | SR014 (E 1 3) | 2 | 29.04.25 | 29.04.25 | No | |
Tutorial #1 | Tutorial | SR014 (E 1 3) | 1 | 28.04.25 | 28.04.25 | No | |
Low-level Basics | Lecture | E2 2, Günter-Hotz-Hörsaal | 24.04.25 | 24.04.25 | No | ||
Tutorial #3 | Tutorial | HS003 (E 1 3) | 3 | 23.04.25 | 23.04.25 | No | |
Tutorial #2 | Tutorial | SR014 (E 1 3) | 2 | 22.04.25 | 22.04.25 | No | |
Operating Systems | Lecture | E2 2, Günter-Hotz-Hörsaal | 17.04.25 | 17.04.25 | No | ||
Tutorial #3 | Tutorial | HS003 (E 1 3) | 3 | 16.04.25 | 16.04.25 | No | |
Tutorial #2 | Tutorial | SR014 (E 1 3) | 2 | 15.04.25 | 15.04.25 | No |