BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//127.0.1.1//NONSGML kigkonsult.se iCalcreator 2.41.92//
CALSCALE:GREGORIAN
METHOD:PUBLISH
UID:37663933-3035-4238-b631-613934383961
X-WR-CALNAME:Foundations of Cybersecurity 2 Calendar
X-WR-CALDESC:Events of the lecture Foundations of Cybersecurity 2
X-WR-TIMEZONE:Europe/Berlin
BEGIN:VEVENT
UID:38343365-6666-4766-a437-653634303664
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260409T120000Z
DTEND:20260409T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Lecture: Introduction
END:VEVENT
BEGIN:VEVENT
UID:61353332-3334-4337-b766-346633666437
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260416T120000Z
DTEND:20260416T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Lecture: Low-Level Basics
END:VEVENT
BEGIN:VEVENT
UID:37396464-3832-4965-a432-323536316539
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260423T120000Z
DTEND:20260423T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Lecture: Operating Systems
END:VEVENT
BEGIN:VEVENT
UID:36396437-6430-4765-b939-303965646438
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260430T120000Z
DTEND:20260430T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Lecture: Memory Corruption 1
END:VEVENT
BEGIN:VEVENT
UID:63626238-6233-4436-b232-373730383631
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260507T120000Z
DTEND:20260507T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Lecture: Memory Corruption 2
END:VEVENT
BEGIN:VEVENT
UID:63353439-6265-4335-b131-396665643365
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260521T120000Z
DTEND:20260521T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Lecture: Debugging
END:VEVENT
BEGIN:VEVENT
UID:30343235-6334-4135-a539-656563343962
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260528T120000Z
DTEND:20260528T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Lecture: Finding Bugs
END:VEVENT
BEGIN:VEVENT
UID:64343439-6461-4433-a265-306261326464
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260611T120000Z
DTEND:20260611T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Lecture: Exploits
END:VEVENT
BEGIN:VEVENT
UID:34353936-3535-4733-b639-376564353464
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260618T120000Z
DTEND:20260618T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Lecture: Mitigations
END:VEVENT
BEGIN:VEVENT
UID:64663535-6232-4763-a462-376461643937
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260625T120000Z
DTEND:20260625T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Lecture: Secure Programming
END:VEVENT
BEGIN:VEVENT
UID:65643233-6439-4932-b065-613239623233
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260702T120000Z
DTEND:20260702T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Lecture: Sandboxing
END:VEVENT
BEGIN:VEVENT
UID:39353930-6164-4938-b138-653034386663
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260709T120000Z
DTEND:20260709T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Lecture: Side-Channel Attacks
END:VEVENT
END:VCALENDAR
