Terry Cutler Featured On

Get the behind-the-scenes strategies I use to protect companies and individuals from online threats.

Learn the secrets of the world’s most successful Cyber Security Experts:


I’m Terry Cutler, the creator of Internet Safety University, which is a system that’s been used to help defend corporations and individuals from cyber threats. I’m a government cleared cybersecurity expert (a Certified Ethical Hacker), and the Vice-President of Cyber at SIRCO, an investigations and protections firm in Montréal, Canada. I’m also a frequent contributor to National & Global media reportage about cyber-crime, spying, security failures, internet scams, and the real social network dangers that families and individuals face every day. I was awarded the 2017 Cybersecurity Educator of the year award. The 2017 Cybersecurity Excellence Awards recognize companies, products and individuals that demonstrate excellence, innovation and leadership in information security.




A complete and effective on-line learning program to keep up with the rapidly changing digital landscape


My course introduces you to the dark side of the internet that many of our children are experiencing while online and connecting through social media sites. I’ll show you how to Google yourself, search out fake profiles, recognize changes in the behaviors of family members, how to block objectionable material, create unbreakable passwords, encouraging us all to assume a mindset toward Internet safety.





Mastering Kali Linux for Advanced Penetration Testing

Conduct realistic and effective security tests on your network Demonstrate how key data systems are stealthily exploited, and learn how to identify attacks against your own systems. Use hands-on techniques to take advantage of Kali Linux, the open source framework of security tools in Detail


Mastering Kali Linux for Advanced Penetration Testing will teach you the kill chain perspective in assessing network security – from selecting the most effective tools, to rapidly compromising network security, to highlighting the techniques used to avoid detection.


This book will take you, as a tester, through the reconnaissance, exploitation, and post-exploitation activities used by penetration testers and hackers. After learning the hands-on techniques to perform an effective and covert attack, specific routes to the target will be examined, including bypassing physical security. You will also get to grips with concepts such as social engineering, attacking wireless networks, web services, and remote access connections. Finally, you will focus on the most vulnerable part of the network – directly attacking the end user.


This book will provide all the practical knowledge needed to test your network’s security using a proven hacker’s methodology.





Terry Cutler wins prestigious International Cyber Security and Intelligence Academic and Leadership Awards

| Events, Internet Safety, Internet Safety, Media, Other, Training | No Comments

Get Informed. Be Aware. Take Action. Cyber Attacks Affect Us All! Ontario College of Management and Technology is proud to…

Help donate to The Missing Children’s Network for the #GivingTuesday #KeepMeSafe campaign for the month of November

| Articles, Internet Safety, Media | No Comments

    Hello and thank you for your willingness to help and join The Missing Children’s Network in their fundraising…

Growing need for cyber security spawns new university program

| Internet Safety, Media, Training, TV Media | No Comments

The numbers sound frightening. Every day, the Canadian government’s public safety department successfully blocks 600 million attempts to find vulnerabilities…

How prepared are our kids to enter and stay safe in the digital world?

| Internet Safety, Media, TV Media | No Comments

This special report looks into how prepared our kids are to enter, and stay safe the digital world. And we…

The Dangers of free anti virus software

| Blog, Internet Safety, Media | No Comments

While I was at a recent conference, I got to hang out with the 42nd president of the United States…

A Hacker’s magic trick

| Internet Safety, Internet Safety, Media, Training | No Comments

What does cyber security and magic have in common? They both have magical powers, misdirection and illusion. Let me tell…

Get the behind-the-scenes strategies I use to protect individuals and corporations from malicious hackers.

Learn the secrets of the world’s most successful Cyber Security Experts: