BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//127.0.1.1//NONSGML kigkonsult.se iCalcreator 2.41.92//
CALSCALE:GREGORIAN
METHOD:PUBLISH
UID:31616663-3836-4530-b331-626332343564
X-WR-CALNAME:Foundations of Cybersecurity 2 Calendar
X-WR-CALDESC:Events of the lecture Foundations of Cybersecurity 2
X-WR-TIMEZONE:Europe/Berlin
BEGIN:VEVENT
UID:35396637-6166-4035-a337-336339336164
DTSTAMP:20260428T182311Z
DESCRIPTION:
DTSTART:20260409T120000Z
DTEND:20260409T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Lecture: Introduction
END:VEVENT
BEGIN:VEVENT
UID:62316339-3136-4464-b763-616436393961
DTSTAMP:20260428T182311Z
DESCRIPTION:
DTSTART:20260416T120000Z
DTEND:20260416T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Lecture: Low-Level Basics
END:VEVENT
BEGIN:VEVENT
UID:64343733-6235-4261-a233-363964333866
DTSTAMP:20260428T182311Z
DESCRIPTION:
DTSTART:20260423T120000Z
DTEND:20260423T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Lecture: Operating Systems
END:VEVENT
BEGIN:VEVENT
UID:66643062-3339-4764-b731-393663343833
DTSTAMP:20260428T182311Z
DESCRIPTION:
DTSTART:20260430T120000Z
DTEND:20260430T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Lecture: Memory Corruption 1
END:VEVENT
BEGIN:VEVENT
UID:38653433-3863-4634-b664-663266663634
DTSTAMP:20260428T182311Z
DESCRIPTION:
DTSTART:20260507T120000Z
DTEND:20260507T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Lecture: Memory Corruption 2
END:VEVENT
BEGIN:VEVENT
UID:65343035-6335-4132-a639-666633363730
DTSTAMP:20260428T182311Z
DESCRIPTION:
DTSTART:20260521T120000Z
DTEND:20260521T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Lecture: Debugging
END:VEVENT
BEGIN:VEVENT
UID:36323836-6336-4363-b731-623136373330
DTSTAMP:20260428T182311Z
DESCRIPTION:
DTSTART:20260528T120000Z
DTEND:20260528T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Lecture: Finding Bugs
END:VEVENT
BEGIN:VEVENT
UID:61343939-6433-4036-b939-613830343362
DTSTAMP:20260428T182311Z
DESCRIPTION:
DTSTART:20260611T120000Z
DTEND:20260611T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Lecture: Exploits
END:VEVENT
BEGIN:VEVENT
UID:37376237-3463-4536-a633-353239646233
DTSTAMP:20260428T182311Z
DESCRIPTION:
DTSTART:20260618T120000Z
DTEND:20260618T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Lecture: Mitigations
END:VEVENT
BEGIN:VEVENT
UID:30326638-3938-4330-b431-396230663331
DTSTAMP:20260428T182311Z
DESCRIPTION:
DTSTART:20260625T120000Z
DTEND:20260625T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Lecture: Secure Programming
END:VEVENT
BEGIN:VEVENT
UID:30613731-3261-4630-b262-623436356336
DTSTAMP:20260428T182311Z
DESCRIPTION:
DTSTART:20260702T120000Z
DTEND:20260702T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Lecture: Sandboxing
END:VEVENT
BEGIN:VEVENT
UID:30626536-3162-4130-b933-643039653335
DTSTAMP:20260428T182311Z
DESCRIPTION:
DTSTART:20260709T120000Z
DTEND:20260709T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Lecture: Side-Channel Attacks
END:VEVENT
END:VCALENDAR
