У нас вы можете посмотреть бесплатно IB Computer Science - Paper 3 - Case Study (2026) - An Ethical Approach to Hacking или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
Need to cram? Check out my handy guide for Paper 3, which also includes some extra information not covered in the video, 2 mock practice papers with sample answers, and the slides (only $3.99): https://csclassroom.gumroad.com/l/ibc... Also available are my: HL Paper 1 Cram Guide ($5.99): https://csclassroom.gumroad.com/l/ibc... Paper 2, Option A (SL & HL) Study Guide ($3.99): https://csclassroom.gumroad.com/l/opt... Paper 2, Option C (SL & HL) Study Guide ($3.99): https://csclassroom.gumroad.com/l/opt... Paper 2, Option D (SL & HL) Study Guide ($3.99): https://csclassroom.gumroad.com/l/opt... How to Teach Coding 🔥 ($9.99): https://csclassroom.gumroad.com/l/how... 00:00 - Intro 01:31 - Scenario 06:35 - Phase 1: Pre-engagement Interactions 12:24 - Testing Approaches 20:26 - Phase 2: Intelligence Gathering 31:20 - Search Engine Dorking 35:46 - Network Scanning/Mapping/Topology Mapping 43:12 - Port Scanning 50:29 - OS Detection 52:26 - IP Address Cataloging 53:57 - Social Media Reconnaissance 56:30 - Vishing 1:00:51 - Pretexting 1:04:01 - Phase 3: Threat Modelling 1:10:11 - Phase 4: Vulnerability Analysis 1:14:13 - Phase 5: Exploitation 1:16:56 - Crash Course: Web Applications 1:19:48 - SQL Injection 1:26:15 - Cross-site Scripting 1:32:25 - Buffer Overflow Attacks 1:38:22 - Password Cracking Tools 1:39:20 - Exploits 1:42:43 - Privilege Escalation 1:43:36 - Phase 6: Post-Exploitation 1:56:19 - Phase 7: Reporting 1:57:58 - Developing a Response Plan 2:08:27 - Ethical Considerations 2:20:23 - Wrap Up