BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//127.0.1.1//NONSGML kigkonsult.se iCalcreator 2.41.92//
CALSCALE:GREGORIAN
METHOD:PUBLISH
UID:35646337-3433-4561-b333-656565336137
X-WR-CALNAME:Foundations of Cybersecurity 2 Calendar
X-WR-CALDESC:Events of the lecture Foundations of Cybersecurity 2
X-WR-TIMEZONE:Europe/Berlin
BEGIN:VEVENT
UID:34643836-3139-4634-b730-393835313733
DTSTAMP:20260404T033629Z
DESCRIPTION:
DTSTART:20260409T120000Z
DTEND:20260409T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Cysecii26: Lecture: Introduction
END:VEVENT
BEGIN:VEVENT
UID:32373832-3032-4634-a566-303737363737
DTSTAMP:20260404T033629Z
DESCRIPTION:
DTSTART:20260416T120000Z
DTEND:20260416T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Cysecii26: Lecture: Low-Level Basics
END:VEVENT
BEGIN:VEVENT
UID:38633261-3731-4231-a536-643135393539
DTSTAMP:20260404T033629Z
DESCRIPTION:
DTSTART:20260423T120000Z
DTEND:20260423T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Cysecii26: Lecture: Operating Systems
END:VEVENT
BEGIN:VEVENT
UID:39343133-6165-4037-b265-666438313663
DTSTAMP:20260404T033629Z
DESCRIPTION:
DTSTART:20260430T120000Z
DTEND:20260430T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Cysecii26: Lecture: Memory Corruption 1
END:VEVENT
BEGIN:VEVENT
UID:61373431-3464-4033-a264-633130623934
DTSTAMP:20260404T033629Z
DESCRIPTION:
DTSTART:20260507T120000Z
DTEND:20260507T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Cysecii26: Lecture: Memory Corruption 2
END:VEVENT
BEGIN:VEVENT
UID:30396435-3961-4231-a538-646135346439
DTSTAMP:20260404T033629Z
DESCRIPTION:
DTSTART:20260521T120000Z
DTEND:20260521T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Cysecii26: Lecture: Debugging
END:VEVENT
BEGIN:VEVENT
UID:37333138-6463-4962-b864-616261333734
DTSTAMP:20260404T033629Z
DESCRIPTION:
DTSTART:20260528T120000Z
DTEND:20260528T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Cysecii26: Lecture: Finding Bugs
END:VEVENT
BEGIN:VEVENT
UID:32383363-3763-4338-b234-393161376133
DTSTAMP:20260404T033629Z
DESCRIPTION:
DTSTART:20260611T120000Z
DTEND:20260611T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Cysecii26: Lecture: Exploits
END:VEVENT
BEGIN:VEVENT
UID:39386566-3130-4239-b266-353433303634
DTSTAMP:20260404T033629Z
DESCRIPTION:
DTSTART:20260618T120000Z
DTEND:20260618T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Cysecii26: Lecture: Mitigations
END:VEVENT
BEGIN:VEVENT
UID:62636336-3165-4236-b036-386566343365
DTSTAMP:20260404T033629Z
DESCRIPTION:
DTSTART:20260625T120000Z
DTEND:20260625T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Cysecii26: Lecture: Secure Programming
END:VEVENT
BEGIN:VEVENT
UID:35646535-6136-4262-b762-363535633831
DTSTAMP:20260404T033629Z
DESCRIPTION:
DTSTART:20260702T120000Z
DTEND:20260702T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Cysecii26: Lecture: Sandboxing
END:VEVENT
BEGIN:VEVENT
UID:38323133-3365-4931-b739-396630326631
DTSTAMP:20260404T033629Z
DESCRIPTION:
DTSTART:20260709T120000Z
DTEND:20260709T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Cysecii26: Lecture: Side-Channel Attacks
END:VEVENT
END:VCALENDAR
