BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//127.0.1.1//NONSGML kigkonsult.se iCalcreator 2.41.92//
CALSCALE:GREGORIAN
METHOD:PUBLISH
UID:30623261-3261-4231-b233-343863306632
X-WR-CALNAME:Foundations of Cybersecurity 2 Calendar
X-WR-CALDESC:Events of the lecture Foundations of Cybersecurity 2
X-WR-TIMEZONE:Europe/Berlin
BEGIN:VEVENT
UID:34336466-3165-4266-b262-373035623964
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260409T120000Z
DTEND:20260409T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Cysecii26: Lecture: Introduction
END:VEVENT
BEGIN:VEVENT
UID:39643539-6232-4433-b666-353431376531
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260410T140000Z
DTEND:20260410T160000Z
LOCATION:SR 016\, E1.3
SUMMARY:Cysecii26: Tutorial 3: Introduction (Moritz Walter)
END:VEVENT
BEGIN:VEVENT
UID:39323730-3036-4831-a531-653330613362
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260413T120000Z
DTEND:20260413T140000Z
LOCATION:SR 016\, E1.3
SUMMARY:Cysecii26: Tutorial 1: Introduction (Iason Becker)
END:VEVENT
BEGIN:VEVENT
UID:63666435-6233-4230-a231-626237316366
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260413T140000Z
DTEND:20260413T160000Z
LOCATION:SR 016\, E1.3
SUMMARY:Cysecii26: Tutorial 2: Introduction (Leonardo Rox Zureikat)
END:VEVENT
BEGIN:VEVENT
UID:38646463-6239-4264-b663-373730306535
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260416T120000Z
DTEND:20260416T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Cysecii26: Lecture: Low-Level Basics
END:VEVENT
BEGIN:VEVENT
UID:36633535-6233-4539-a434-333632613438
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260417T140000Z
DTEND:20260417T160000Z
LOCATION:SR 016\, E1.3
SUMMARY:Cysecii26: Tutorial 3: Low-Level Basics (Moritz Walter)
END:VEVENT
BEGIN:VEVENT
UID:38356439-3665-4036-a561-626265633833
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260420T120000Z
DTEND:20260420T140000Z
LOCATION:SR 016\, E1.3
SUMMARY:Cysecii26: Tutorial 1: Low-Level Basics (Iason Becker)
END:VEVENT
BEGIN:VEVENT
UID:39353661-3666-4236-b461-663932663765
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260420T140000Z
DTEND:20260420T160000Z
LOCATION:SR 016\, E1.3
SUMMARY:Cysecii26: Tutorial 2: Low-Level Basics (Leonardo Rox Zureikat)
END:VEVENT
BEGIN:VEVENT
UID:30306333-3636-4935-b962-333735663630
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260423T120000Z
DTEND:20260423T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Cysecii26: Lecture: Operating Systems
END:VEVENT
BEGIN:VEVENT
UID:36343039-6130-4235-b737-316165323435
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260424T140000Z
DTEND:20260424T160000Z
LOCATION:SR 016\, E1.3
SUMMARY:Cysecii26: Tutorial 3: Operating Systems (Moritz Walter)
END:VEVENT
BEGIN:VEVENT
UID:37353939-3436-4935-a638-363463303965
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260427T120000Z
DTEND:20260427T140000Z
LOCATION:SR 016\, E1.3
SUMMARY:Cysecii26: Tutorial 1: Operating Systems (Iason Becker)
END:VEVENT
BEGIN:VEVENT
UID:34333263-3164-4232-a537-333865666334
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260427T140000Z
DTEND:20260427T160000Z
LOCATION:SR 016\, E1.3
SUMMARY:Cysecii26: Tutorial 2: Operating Systems (Leonardo Rox Zureikat)
END:VEVENT
BEGIN:VEVENT
UID:33323937-3533-4366-a435-346666346234
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260430T120000Z
DTEND:20260430T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Cysecii26: Lecture: Memory Corruption 1
END:VEVENT
BEGIN:VEVENT
UID:62386332-3538-4965-b665-656138623433
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260504T120000Z
DTEND:20260504T140000Z
LOCATION:SR 016\, E1.3
SUMMARY:Cysecii26: Tutorial 1: Memory Corruption 1 (Iason Becker)
END:VEVENT
BEGIN:VEVENT
UID:32636436-6637-4864-b835-633533626664
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260504T140000Z
DTEND:20260504T160000Z
LOCATION:SR 016\, E1.3
SUMMARY:Cysecii26: Tutorial 2: Memory Corruption 1 (Leonardo Rox Zureikat)
END:VEVENT
BEGIN:VEVENT
UID:39363364-3861-4862-b431-303836336639
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260507T120000Z
DTEND:20260507T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Cysecii26: Lecture: Memory Corruption 2
END:VEVENT
BEGIN:VEVENT
UID:61383032-3636-4238-b437-643365626538
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260508T140000Z
DTEND:20260508T160000Z
LOCATION:SR 016\, E1.3
SUMMARY:Cysecii26: Tutorial 3: Memory Corruption 2 (Moritz Walter)
END:VEVENT
BEGIN:VEVENT
UID:38346534-3139-4662-b361-663165323566
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260511T120000Z
DTEND:20260511T140000Z
LOCATION:SR 016\, E1.3
SUMMARY:Cysecii26: Tutorial 1: Memory Corruption 2 (Iason Becker)
END:VEVENT
BEGIN:VEVENT
UID:64303763-6130-4561-b166-313438623235
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260511T140000Z
DTEND:20260511T160000Z
LOCATION:SR 016\, E1.3
SUMMARY:Cysecii26: Tutorial 2: Memory Corruption 2 (Leonardo Rox Zureikat)
END:VEVENT
BEGIN:VEVENT
UID:63306436-3961-4435-a133-653261336232
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260521T120000Z
DTEND:20260521T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Cysecii26: Lecture: Debugging
END:VEVENT
BEGIN:VEVENT
UID:39326561-6461-4665-b764-663932323933
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260522T140000Z
DTEND:20260522T160000Z
LOCATION:SR 016\, E1.3
SUMMARY:Cysecii26: Tutorial 3: Debugging (Moritz Walter)
END:VEVENT
BEGIN:VEVENT
UID:35333438-3531-4531-b434-346464663865
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260525T120000Z
DTEND:20260525T140000Z
LOCATION:SR 016\, E1.3
SUMMARY:Cysecii26: Tutorial 1: Debugging (Iason Becker)
END:VEVENT
BEGIN:VEVENT
UID:38303061-3131-4334-a634-323036636336
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260525T140000Z
DTEND:20260525T160000Z
LOCATION:SR 016\, E1.3
SUMMARY:Cysecii26: Tutorial 2: Debugging (Leonardo Rox Zureikat)
END:VEVENT
BEGIN:VEVENT
UID:32353566-3461-4330-b236-316339333239
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260528T120000Z
DTEND:20260528T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Cysecii26: Lecture: Finding Bugs
END:VEVENT
BEGIN:VEVENT
UID:37666135-3238-4630-b265-356637393235
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260529T140000Z
DTEND:20260529T160000Z
LOCATION:SR 016\, E1.3
SUMMARY:Cysecii26: Tutorial 3: Finding Bugs (Moritz Walter)
END:VEVENT
BEGIN:VEVENT
UID:35653363-3765-4937-b935-663934323165
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260601T120000Z
DTEND:20260601T140000Z
LOCATION:SR 016\, E1.3
SUMMARY:Cysecii26: Tutorial 1: Finding Bugs (Iason Becker)
END:VEVENT
BEGIN:VEVENT
UID:31393035-3235-4639-b335-373863303662
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260601T140000Z
DTEND:20260601T160000Z
LOCATION:SR 016\, E1.3
SUMMARY:Cysecii26: Tutorial 2: Finding Bugs (Leonardo Rox Zureikat)
END:VEVENT
BEGIN:VEVENT
UID:33353662-6563-4061-b663-663963376634
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260611T120000Z
DTEND:20260611T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Cysecii26: Lecture: Exploits
END:VEVENT
BEGIN:VEVENT
UID:37336532-6435-4436-b839-353939396536
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260612T140000Z
DTEND:20260612T160000Z
LOCATION:SR 016\, E1.3
SUMMARY:Cysecii26: Tutorial 3: Exploits (Moritz Walter)
END:VEVENT
BEGIN:VEVENT
UID:39346538-6461-4363-a135-373562613836
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260615T120000Z
DTEND:20260615T140000Z
LOCATION:SR 016\, E1.3
SUMMARY:Cysecii26: Tutorial 1: Exploits (Iason Becker)
END:VEVENT
BEGIN:VEVENT
UID:65306433-6435-4761-b634-613231643261
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260615T140000Z
DTEND:20260615T160000Z
LOCATION:SR 016\, E1.3
SUMMARY:Cysecii26: Tutorial 2: Exploits (Leonardo Rox Zureikat)
END:VEVENT
BEGIN:VEVENT
UID:37643232-6464-4264-a365-633532373932
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260618T120000Z
DTEND:20260618T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Cysecii26: Lecture: Mitigations
END:VEVENT
BEGIN:VEVENT
UID:34386563-6538-4133-a237-383536356166
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260619T140000Z
DTEND:20260619T160000Z
LOCATION:SR 016\, E1.3
SUMMARY:Cysecii26: Tutorial 3: Mitigations (Moritz Walter)
END:VEVENT
BEGIN:VEVENT
UID:39626533-3535-4437-b935-646130353738
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260622T120000Z
DTEND:20260622T140000Z
LOCATION:SR 016\, E1.3
SUMMARY:Cysecii26: Tutorial 1: Mitigations (Iason Becker)
END:VEVENT
BEGIN:VEVENT
UID:62303831-3130-4662-a137-653332303730
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260622T140000Z
DTEND:20260622T160000Z
LOCATION:SR 016\, E1.3
SUMMARY:Cysecii26: Tutorial 2: Mitigations (Leonardo Rox Zureikat)
END:VEVENT
BEGIN:VEVENT
UID:61343835-3531-4863-a533-383862363864
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260625T120000Z
DTEND:20260625T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Cysecii26: Lecture: Secure Programming
END:VEVENT
BEGIN:VEVENT
UID:66363964-3937-4163-a637-666333633363
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260626T140000Z
DTEND:20260626T160000Z
LOCATION:SR 016\, E1.3
SUMMARY:Cysecii26: Tutorial 3: Secure Programming (Moritz Walter)
END:VEVENT
BEGIN:VEVENT
UID:32636462-3934-4333-b236-363535366237
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260629T120000Z
DTEND:20260629T140000Z
LOCATION:SR 016\, E1.3
SUMMARY:Cysecii26: Tutorial 1: Secure Programming (Iason Becker)
END:VEVENT
BEGIN:VEVENT
UID:33313963-6463-4031-b836-303635623165
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260629T140000Z
DTEND:20260629T160000Z
LOCATION:SR 016\, E1.3
SUMMARY:Cysecii26: Tutorial 2: Secure Programming (Leonardo Rox Zureikat)
END:VEVENT
BEGIN:VEVENT
UID:34373835-6434-4463-a333-373337326265
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260702T120000Z
DTEND:20260702T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Cysecii26: Lecture: Sandboxing
END:VEVENT
BEGIN:VEVENT
UID:32346631-3638-4432-b732-396364363536
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260703T140000Z
DTEND:20260703T160000Z
LOCATION:SR 016\, E1.3
SUMMARY:Cysecii26: Tutorial 3: Sandboxing (Moritz Walter)
END:VEVENT
BEGIN:VEVENT
UID:39633731-3364-4131-b965-663962623262
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260706T120000Z
DTEND:20260706T140000Z
LOCATION:SR 016\, E1.3
SUMMARY:Cysecii26: Tutorial 1: Sandboxing (Iason Becker)
END:VEVENT
BEGIN:VEVENT
UID:31346337-3765-4664-b639-343939666133
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260706T140000Z
DTEND:20260706T160000Z
LOCATION:SR 016\, E1.3
SUMMARY:Cysecii26: Tutorial 2: Sandboxing (Leonardo Rox Zureikat)
END:VEVENT
BEGIN:VEVENT
UID:36353339-3335-4534-b761-626133633536
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260709T120000Z
DTEND:20260709T140000Z
LOCATION:E2.2\, 0.01 (GHH)
SUMMARY:Cysecii26: Lecture: Side-Channel Attacks
END:VEVENT
BEGIN:VEVENT
UID:36616461-3233-4462-b538-643833666466
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260710T140000Z
DTEND:20260710T160000Z
LOCATION:SR 016\, E1.3
SUMMARY:Cysecii26: Tutorial 3: Side-Channel Attacks (Moritz Walter)
END:VEVENT
BEGIN:VEVENT
UID:64363963-3638-4637-b263-396465613731
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260713T120000Z
DTEND:20260713T140000Z
LOCATION:SR 016\, E1.3
SUMMARY:Cysecii26: Tutorial 1: Side-Channel Attacks (Iason Becker)
END:VEVENT
BEGIN:VEVENT
UID:62633538-3235-4465-a330-653638326364
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260713T140000Z
DTEND:20260713T160000Z
LOCATION:SR 016\, E1.3
SUMMARY:Cysecii26: Tutorial 2: Side-Channel Attacks (Leonardo Rox Zureikat)
END:VEVENT
BEGIN:VEVENT
UID:66326337-3863-4332-b830-383766393465
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260804T120000Z
DTEND:20260804T150000Z
LOCATION:E1.3\, HS 1
SUMMARY:Cysecii26: Main Exam
END:VEVENT
BEGIN:VEVENT
UID:30373435-6636-4035-b335-393636353338
DTSTAMP:20260519T103308Z
DESCRIPTION:
DTSTART:20260915T120000Z
DTEND:20260915T150000Z
LOCATION:E1.3\, HS 2 + HS 3
SUMMARY:Cysecii26: Re-Exam
END:VEVENT
END:VCALENDAR
