| Title |
Type |
Location |
Serial |
Start |
End |
All Day |
|
|
Tutorial 2: Secure Programming (Leonardo Rox Zureikat) |
Tutorial |
SR 016, E1.3 |
7 |
29.06.26 |
29.06.26 |
No |
|
|
Tutorial 1: Secure Programming (Iason Becker) |
Tutorial |
SR 016, E1.3 |
6 |
29.06.26 |
29.06.26 |
No |
|
|
Tutorial 3: Secure Programming (Moritz Walter) |
Tutorial |
SR 016, E1.3 |
9 |
26.06.26 |
26.06.26 |
No |
|
|
Lecture: Secure Programming |
Lecture |
E2.2, 0.01 (GHH) |
2 |
25.06.26 |
25.06.26 |
No |
|
|
Tutorial 2: Mitigations (Leonardo Rox Zureikat) |
Tutorial |
SR 016, E1.3 |
7 |
22.06.26 |
22.06.26 |
No |
|
|
Tutorial 1: Mitigations (Iason Becker) |
Tutorial |
SR 016, E1.3 |
6 |
22.06.26 |
22.06.26 |
No |
|
|
Tutorial 3: Mitigations (Moritz Walter) |
Tutorial |
SR 016, E1.3 |
9 |
19.06.26 |
19.06.26 |
No |
|
|
Lecture: Mitigations |
Lecture |
E2.2, 0.01 (GHH) |
2 |
18.06.26 |
18.06.26 |
No |
|
|
Tutorial 2: Exploits (Leonardo Rox Zureikat) |
Tutorial |
SR 016, E1.3 |
7 |
15.06.26 |
15.06.26 |
No |
|
|
Tutorial 1: Exploits (Iason Becker) |
Tutorial |
SR 016, E1.3 |
6 |
15.06.26 |
15.06.26 |
No |
|