1 00:00:00,080 --> 00:00:03,770 One of the most crucial skills for an investigator. 2 00:00:03,800 --> 00:00:09,710 Ethical hacker, or any related professional is the effective use of search engines. 3 00:00:09,860 --> 00:00:16,010 Mastering these skills will enable you to quickly discover information about a target online. 4 00:00:16,040 --> 00:00:22,790 It's actually my go to method for quickly finding information about anything on the internet. 5 00:00:22,820 --> 00:00:29,660 First, I'll teach you how to apply search operators on Google, Bing, and Yandex to narrow down your 6 00:00:29,660 --> 00:00:36,680 search results, ensuring you retrieve only relevant information about the entity you are investigating. 7 00:00:36,920 --> 00:00:43,220 In addition to that, I'll demonstrate to you how to leverage AI to generate custom search operators 8 00:00:43,220 --> 00:00:44,540 for Google. 9 00:00:44,900 --> 00:00:52,250 I'll also teach you how you can use Google Hacking database to uncover sensitive information on the 10 00:00:52,250 --> 00:00:58,010 internet, such as public cameras, vulnerabilities, passwords, etc.. 11 00:00:58,040 --> 00:01:04,520 Finally, at the end of this section, there will be a voluntary quiz designed to reinforce your learning 12 00:01:04,520 --> 00:01:07,880 and test your understanding of the skills covered. 13 00:01:08,480 --> 00:01:13,610 Being proficient at using search engines is a fundamental skill for Osint. 14 00:01:13,640 --> 00:01:20,540 The ability to accurately extract information of the vast expanse of the internet can make the difference 15 00:01:20,540 --> 00:01:24,710 between a successful investigation and a dead end. 16 00:01:25,160 --> 00:01:31,340 So this section is designed to give you the necessary skills and basics that will make you an expert 17 00:01:31,340 --> 00:01:32,330 at your field. 18 00:01:32,660 --> 00:01:39,020 This will enhance your efficiency and your effectiveness as an investigator, enabling you to uncover 19 00:01:39,020 --> 00:01:44,330 critical insights and connections that might otherwise remain hidden.