| Title | Type | Location | Serial | Start | End | All Day |  | 
		
		| Operating Systems | Lecture | E2 2, Günter-Hotz-Hörsaal |  | 17.04.25 | 17.04.25 | No |  | 
	
		| Low-level Basics | Lecture | E2 2, Günter-Hotz-Hörsaal |  | 24.04.25 | 24.04.25 | No |  | 
	
		| Memory Corruption - Overflows | Lecture | E2 2, Günter-Hotz-Hörsaal |  | 08.05.25 | 08.05.25 | No |  | 
	
		| Memory Corruption II & Environment | Lecture | E2 2, Günter-Hotz-Hörsaal |  | 15.05.25 | 15.05.25 | No |  | 
	
		| Exploits | Lecture | E2 2, Günter-Hotz-Hörsaal |  | 22.05.25 | 22.05.25 | No |  | 
	
		| Debugging | Lecture | E2 2, Günter-Hotz-Hörsaal |  | 05.06.25 | 05.06.25 | No |  | 
	
		| Finding Bugs | Lecture | E2 2, Günter-Hotz-Hörsaal |  | 12.06.25 | 12.06.25 | No |  | 
	
		| Mitigations | Lecture | E2 2, Günter-Hotz-Hörsaal |  | 26.06.25 | 26.06.25 | No |  | 
	
		| Secure Programming | Lecture | E2 2, Günter-Hotz-Hörsaal |  | 03.07.25 | 03.07.25 | No |  | 
	
		| Introduction | Lecture | E2 2, Günter-Hotz-Hörsaal |  | 10.04.25 | 10.04.25 | No |  |