BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//127.0.1.1//NONSGML kigkonsult.se iCalcreator 2.41.92//
CALSCALE:GREGORIAN
METHOD:PUBLISH
UID:31393361-3732-4863-a233-643239383339
X-WR-CALNAME:Foundations of Cybersecurity 2 Calendar
X-WR-CALDESC:Events of the lecture Foundations of Cybersecurity 2
X-WR-TIMEZONE:Europe/Berlin
BEGIN:VEVENT
UID:61663138-3836-4166-a366-643866333964
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260409T120000Z
DTEND:20260409T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Cysecii26: Lecture: Introduction
END:VEVENT
BEGIN:VEVENT
UID:61613464-3330-4337-b238-326337663530
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260416T120000Z
DTEND:20260416T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Cysecii26: Lecture: Low-Level Basics
END:VEVENT
BEGIN:VEVENT
UID:38373036-3462-4837-b438-656639616366
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260423T120000Z
DTEND:20260423T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Cysecii26: Lecture: Operating Systems
END:VEVENT
BEGIN:VEVENT
UID:33356132-3661-4331-b863-666561646335
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260430T120000Z
DTEND:20260430T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Cysecii26: Lecture: Memory Corruption 1
END:VEVENT
BEGIN:VEVENT
UID:34323733-3666-4461-b235-383233643836
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260507T120000Z
DTEND:20260507T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Cysecii26: Lecture: Memory Corruption 2
END:VEVENT
BEGIN:VEVENT
UID:36663833-6262-4330-b566-333331613435
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260521T120000Z
DTEND:20260521T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Cysecii26: Lecture: Debugging
END:VEVENT
BEGIN:VEVENT
UID:66346562-3566-4762-b839-626263316238
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260528T120000Z
DTEND:20260528T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Cysecii26: Lecture: Finding Bugs
END:VEVENT
BEGIN:VEVENT
UID:31386639-6430-4339-b862-656663336436
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260611T120000Z
DTEND:20260611T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Cysecii26: Lecture: Exploits
END:VEVENT
BEGIN:VEVENT
UID:34383539-3965-4566-b966-643135303064
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260618T120000Z
DTEND:20260618T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Cysecii26: Lecture: Mitigations
END:VEVENT
BEGIN:VEVENT
UID:34653264-3939-4431-a566-333638393130
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260625T120000Z
DTEND:20260625T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Cysecii26: Lecture: Secure Programming
END:VEVENT
BEGIN:VEVENT
UID:37346261-3066-4131-a261-646363396130
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260702T120000Z
DTEND:20260702T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Cysecii26: Lecture: Sandboxing
END:VEVENT
BEGIN:VEVENT
UID:30373236-3933-4737-b539-653331656366
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260709T120000Z
DTEND:20260709T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Cysecii26: Lecture: Side-Channel Attacks
END:VEVENT
END:VCALENDAR
