Terry Cutler Featured On

Get the behind-the-scenes strategies I use to protect companies and individuals from online threats.

Learn the secrets of the world’s most successful Cyber Security Experts:


I’m Terry Cutler, the creator of Internet Safety University, which is a system that’s been used to help defend corporations and individuals from cyber threats. I’m a government cleared cybersecurity expert (a Certified Ethical Hacker), and the Vice-President of Cyber at SIRCO, an investigations and protections firm in Montréal, Canada. I’m also a frequent contributor to National & Global media reportage about cyber-crime, spying, security failures, internet scams, and the real social network dangers that families and individuals face every day. I was awarded the 2017 Cybersecurity Educator of the year award. The 2017 Cybersecurity Excellence Awards recognize companies, products and individuals that demonstrate excellence, innovation and leadership in information security.




A complete and effective on-line learning program to keep up with the rapidly changing digital landscape


My course introduces you to the dark side of the internet that many of our children are experiencing while online and connecting through social media sites. I’ll show you how to Google yourself, search out fake profiles, recognize changes in the behaviors of family members, how to block objectionable material, create unbreakable passwords, encouraging us all to assume a mindset toward Internet safety.





Mastering Kali Linux for Advanced Penetration Testing

Conduct realistic and effective security tests on your network Demonstrate how key data systems are stealthily exploited, and learn how to identify attacks against your own systems. Use hands-on techniques to take advantage of Kali Linux, the open source framework of security tools in Detail


Mastering Kali Linux for Advanced Penetration Testing will teach you the kill chain perspective in assessing network security – from selecting the most effective tools, to rapidly compromising network security, to highlighting the techniques used to avoid detection.


This book will take you, as a tester, through the reconnaissance, exploitation, and post-exploitation activities used by penetration testers and hackers. After learning the hands-on techniques to perform an effective and covert attack, specific routes to the target will be examined, including bypassing physical security. You will also get to grips with concepts such as social engineering, attacking wireless networks, web services, and remote access connections. Finally, you will focus on the most vulnerable part of the network – directly attacking the end user.


This book will provide all the practical knowledge needed to test your network’s security using a proven hacker’s methodology.





TerryCutler blog selected by Feedspot panelists as one of the Top 75 Hacker Blogs on the web

| Articles, Blog, Media | No Comments

Hacker Blogs List I would like to personally congratulate you as your blog Terry Cutler has been selected by our…

Where technology goes, so do hackers

| Internet Safety, Media | No Comments

Mobile adoption and capabilities; anywhere from access to email, applications, the Internet and company data, is expanding, and so is…

Unknown missed calls good for Vanuatu, but not you

| Articles, Internet Safety, Media | No Comments

The tiny carefree island-nation of Vanuatu in the South Pacific Ocean was once known as the happiest place on the planet,…

Facebook Privecy Check-Up

How to perform a Facebook privacy checkup Launch video 3

| Internet Safety, Media | No Comments

Just to recap what you learned in my last video, I taught you about the latest online threats such as…

terry cutler in an interview

Cops warn of scammers using fake claims of tax refunds

| Internet Safety, Media, TV Media | No Comments

With the deadline to file tax returns approaching, police are warning of scammers attempting to defraud people of their personal…

Get the behind-the-scenes strategies I use to protect individuals and corporations from malicious hackers.

Learn the secrets of the world’s most successful Cyber Security Experts: