BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//127.0.1.1//NONSGML kigkonsult.se iCalcreator 2.41.92//
CALSCALE:GREGORIAN
METHOD:PUBLISH
UID:37643332-6531-4865-a334-646130343335
X-WR-CALNAME:Foundations of Cybersecurity 2 Calendar
X-WR-CALDESC:Events of the lecture Foundations of Cybersecurity 2
X-WR-TIMEZONE:Europe/Berlin
BEGIN:VEVENT
UID:35376339-3332-4264-b333-626233643532
DTSTAMP:20260428T182317Z
DESCRIPTION:
DTSTART:20260409T120000Z
DTEND:20260409T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Cysecii26: Lecture: Introduction
END:VEVENT
BEGIN:VEVENT
UID:63303561-3865-4465-b932-376432636538
DTSTAMP:20260428T182317Z
DESCRIPTION:
DTSTART:20260416T120000Z
DTEND:20260416T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Cysecii26: Lecture: Low-Level Basics
END:VEVENT
BEGIN:VEVENT
UID:35386139-6635-4266-b261-613531323934
DTSTAMP:20260428T182317Z
DESCRIPTION:
DTSTART:20260423T120000Z
DTEND:20260423T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Cysecii26: Lecture: Operating Systems
END:VEVENT
BEGIN:VEVENT
UID:31333931-3030-4234-b839-356633333633
DTSTAMP:20260428T182317Z
DESCRIPTION:
DTSTART:20260430T120000Z
DTEND:20260430T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Cysecii26: Lecture: Memory Corruption 1
END:VEVENT
BEGIN:VEVENT
UID:66646365-3737-4438-a639-323065613233
DTSTAMP:20260428T182317Z
DESCRIPTION:
DTSTART:20260507T120000Z
DTEND:20260507T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Cysecii26: Lecture: Memory Corruption 2
END:VEVENT
BEGIN:VEVENT
UID:63656230-3531-4638-b135-343436386332
DTSTAMP:20260428T182317Z
DESCRIPTION:
DTSTART:20260521T120000Z
DTEND:20260521T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Cysecii26: Lecture: Debugging
END:VEVENT
BEGIN:VEVENT
UID:66343537-6164-4831-b038-646661313963
DTSTAMP:20260428T182317Z
DESCRIPTION:
DTSTART:20260528T120000Z
DTEND:20260528T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Cysecii26: Lecture: Finding Bugs
END:VEVENT
BEGIN:VEVENT
UID:35626364-3037-4164-b339-386430343662
DTSTAMP:20260428T182317Z
DESCRIPTION:
DTSTART:20260611T120000Z
DTEND:20260611T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Cysecii26: Lecture: Exploits
END:VEVENT
BEGIN:VEVENT
UID:62373933-3038-4461-a631-303966613665
DTSTAMP:20260428T182317Z
DESCRIPTION:
DTSTART:20260618T120000Z
DTEND:20260618T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Cysecii26: Lecture: Mitigations
END:VEVENT
BEGIN:VEVENT
UID:30616331-3765-4266-a139-386231386363
DTSTAMP:20260428T182317Z
DESCRIPTION:
DTSTART:20260625T120000Z
DTEND:20260625T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Cysecii26: Lecture: Secure Programming
END:VEVENT
BEGIN:VEVENT
UID:36613832-3739-4636-a264-376530346633
DTSTAMP:20260428T182317Z
DESCRIPTION:
DTSTART:20260702T120000Z
DTEND:20260702T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Cysecii26: Lecture: Sandboxing
END:VEVENT
BEGIN:VEVENT
UID:64386333-3432-4636-a562-343730613233
DTSTAMP:20260428T182317Z
DESCRIPTION:
DTSTART:20260709T120000Z
DTEND:20260709T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Cysecii26: Lecture: Side-Channel Attacks
END:VEVENT
END:VCALENDAR
