BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//127.0.1.1//NONSGML kigkonsult.se iCalcreator 2.41.92//
CALSCALE:GREGORIAN
METHOD:PUBLISH
UID:39366666-3065-4064-a135-343733303063
X-WR-CALNAME:Foundations of Cybersecurity 2 Calendar
X-WR-CALDESC:Events of the lecture Foundations of Cybersecurity 2
X-WR-TIMEZONE:Europe/Berlin
BEGIN:VEVENT
UID:66616661-6564-4430-b966-343964326433
DTSTAMP:20260404T050014Z
DESCRIPTION:
DTSTART:20260409T120000Z
DTEND:20260409T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Lecture: Introduction
END:VEVENT
BEGIN:VEVENT
UID:32343536-3135-4364-b939-353531323133
DTSTAMP:20260404T050014Z
DESCRIPTION:
DTSTART:20260416T120000Z
DTEND:20260416T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Lecture: Low-Level Basics
END:VEVENT
BEGIN:VEVENT
UID:31646439-3761-4238-b431-303561393563
DTSTAMP:20260404T050014Z
DESCRIPTION:
DTSTART:20260423T120000Z
DTEND:20260423T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Lecture: Operating Systems
END:VEVENT
BEGIN:VEVENT
UID:37666463-6239-4637-a137-656637363038
DTSTAMP:20260404T050014Z
DESCRIPTION:
DTSTART:20260430T120000Z
DTEND:20260430T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Lecture: Memory Corruption 1
END:VEVENT
BEGIN:VEVENT
UID:39313664-3339-4665-b137-623632353963
DTSTAMP:20260404T050014Z
DESCRIPTION:
DTSTART:20260507T120000Z
DTEND:20260507T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Lecture: Memory Corruption 2
END:VEVENT
BEGIN:VEVENT
UID:64616336-6138-4164-b538-666131623332
DTSTAMP:20260404T050014Z
DESCRIPTION:
DTSTART:20260521T120000Z
DTEND:20260521T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Lecture: Debugging
END:VEVENT
BEGIN:VEVENT
UID:65643032-3031-4735-b734-306430643133
DTSTAMP:20260404T050014Z
DESCRIPTION:
DTSTART:20260528T120000Z
DTEND:20260528T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Lecture: Finding Bugs
END:VEVENT
BEGIN:VEVENT
UID:35363931-6565-4832-b836-393030343566
DTSTAMP:20260404T050014Z
DESCRIPTION:
DTSTART:20260611T120000Z
DTEND:20260611T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Lecture: Exploits
END:VEVENT
BEGIN:VEVENT
UID:61663936-3365-4665-a636-323962646138
DTSTAMP:20260404T050014Z
DESCRIPTION:
DTSTART:20260618T120000Z
DTEND:20260618T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Lecture: Mitigations
END:VEVENT
BEGIN:VEVENT
UID:63323064-3735-4262-b038-356137643931
DTSTAMP:20260404T050014Z
DESCRIPTION:
DTSTART:20260625T120000Z
DTEND:20260625T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Lecture: Secure Programming
END:VEVENT
BEGIN:VEVENT
UID:36303733-6665-4465-a332-346335303332
DTSTAMP:20260404T050014Z
DESCRIPTION:
DTSTART:20260702T120000Z
DTEND:20260702T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Lecture: Sandboxing
END:VEVENT
BEGIN:VEVENT
UID:64323439-3839-4933-a637-316639383364
DTSTAMP:20260404T050014Z
DESCRIPTION:
DTSTART:20260709T120000Z
DTEND:20260709T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Lecture: Side-Channel Attacks
END:VEVENT
END:VCALENDAR
