| Title |
Type |
Location |
Serial |
Start |
End |
All Day |
|
|
Tutorial 2: Finding Bugs (Leonardo Rox Zureikat) |
Tutorial |
SR 016, E1.3 |
7 |
01.06.26 |
01.06.26 |
No |
|
|
Tutorial 2: Exploits (Leonardo Rox Zureikat) |
Tutorial |
SR 016, E1.3 |
7 |
15.06.26 |
15.06.26 |
No |
|
|
Tutorial 2: Mitigations (Leonardo Rox Zureikat) |
Tutorial |
SR 016, E1.3 |
7 |
22.06.26 |
22.06.26 |
No |
|
|
Tutorial 2: Operating Systems (Leonardo Rox Zureikat) |
Tutorial |
SR 016, E1.3 |
7 |
27.04.26 |
27.04.26 |
No |
|
|
Tutorial 2: Memory Corruption 1 (Leonardo Rox Zureikat) |
Tutorial |
SR 016, E1.3 |
7 |
04.05.26 |
04.05.26 |
No |
|
|
Tutorial 2: Side-Channel Attacks (Leonardo Rox Zureikat) |
Tutorial |
SR 016, E1.3 |
7 |
13.07.26 |
13.07.26 |
No |
|
|
Tutorial 1: Operating Systems (Iason Becker) |
Tutorial |
SR 016, E1.3 |
6 |
27.04.26 |
27.04.26 |
No |
|
|
Tutorial 1: Low-Level Basics (Iason Becker) |
Tutorial |
SR 016, E1.3 |
6 |
20.04.26 |
20.04.26 |
No |
|
|
Tutorial 1: Memory Corruption 1 (Iason Becker) |
Tutorial |
SR 016, E1.3 |
6 |
04.05.26 |
04.05.26 |
No |
|
|
Tutorial 1: Finding Bugs (Iason Becker) |
Tutorial |
SR 016, E1.3 |
6 |
01.06.26 |
01.06.26 |
No |
|