BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//127.0.1.1//NONSGML kigkonsult.se iCalcreator 2.41.92//
CALSCALE:GREGORIAN
METHOD:PUBLISH
UID:32396330-6264-4137-a663-323239353465
X-WR-CALNAME:Foundations of Cybersecurity 2 Calendar
X-WR-CALDESC:Events of the lecture Foundations of Cybersecurity 2
X-WR-TIMEZONE:Europe/Berlin
BEGIN:VEVENT
UID:36346363-3332-4366-b962-623637626465
DTSTAMP:20260404T033629Z
DESCRIPTION:
DTSTART:20260409T120000Z
DTEND:20260409T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Lecture: Introduction
END:VEVENT
BEGIN:VEVENT
UID:61383136-3131-4563-a663-376133386635
DTSTAMP:20260404T033629Z
DESCRIPTION:
DTSTART:20260416T120000Z
DTEND:20260416T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Lecture: Low-Level Basics
END:VEVENT
BEGIN:VEVENT
UID:35646131-3763-4862-b539-356239376333
DTSTAMP:20260404T033629Z
DESCRIPTION:
DTSTART:20260423T120000Z
DTEND:20260423T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Lecture: Operating Systems
END:VEVENT
BEGIN:VEVENT
UID:61336463-6265-4938-a466-303734356235
DTSTAMP:20260404T033629Z
DESCRIPTION:
DTSTART:20260430T120000Z
DTEND:20260430T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Lecture: Memory Corruption 1
END:VEVENT
BEGIN:VEVENT
UID:30323666-6361-4234-b538-383534626639
DTSTAMP:20260404T033629Z
DESCRIPTION:
DTSTART:20260507T120000Z
DTEND:20260507T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Lecture: Memory Corruption 2
END:VEVENT
BEGIN:VEVENT
UID:65393365-3333-4235-b562-636635613562
DTSTAMP:20260404T033629Z
DESCRIPTION:
DTSTART:20260521T120000Z
DTEND:20260521T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Lecture: Debugging
END:VEVENT
BEGIN:VEVENT
UID:34363339-3539-4639-b164-303638353166
DTSTAMP:20260404T033629Z
DESCRIPTION:
DTSTART:20260528T120000Z
DTEND:20260528T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Lecture: Finding Bugs
END:VEVENT
BEGIN:VEVENT
UID:32386539-3666-4566-b239-363864373938
DTSTAMP:20260404T033629Z
DESCRIPTION:
DTSTART:20260611T120000Z
DTEND:20260611T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Lecture: Exploits
END:VEVENT
BEGIN:VEVENT
UID:31626135-6636-4366-a463-636333633535
DTSTAMP:20260404T033629Z
DESCRIPTION:
DTSTART:20260618T120000Z
DTEND:20260618T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Lecture: Mitigations
END:VEVENT
BEGIN:VEVENT
UID:61636135-3733-4165-b334-346632653566
DTSTAMP:20260404T033629Z
DESCRIPTION:
DTSTART:20260625T120000Z
DTEND:20260625T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Lecture: Secure Programming
END:VEVENT
BEGIN:VEVENT
UID:32613537-6565-4338-a531-653430663238
DTSTAMP:20260404T033629Z
DESCRIPTION:
DTSTART:20260702T120000Z
DTEND:20260702T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Lecture: Sandboxing
END:VEVENT
BEGIN:VEVENT
UID:39623030-3166-4964-b366-363564353166
DTSTAMP:20260404T033629Z
DESCRIPTION:
DTSTART:20260709T120000Z
DTEND:20260709T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Lecture: Side-Channel Attacks
END:VEVENT
END:VCALENDAR
