Jason Dion
Lead Instructor, Dion Training Solutions
Jason Dion specializes in providing actionable information you can use to further your cybersecurity and information technology career. His IT certification and training courses teach you real-world application of the skills needed to face today's cybersecurity challenges.
Dion is an instructor at Liberty University’s College of Engineering and Computational Science and Anne Arundel Community College’s Department of Computing Technologies with multiple information technology professional certifications, including Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Certified Network Defense Architect (CNDA), Digital Forensic Examiner (DFE), Digital Media Collector (DMC), Security+, Network+, A+, PRINCE2, PRINCE2 Agile and ITIL.
Content from Jason Dion
CompTIA PenTest+
CompTIA PenTest+
The CompTIA PenTest+ certification path teaches you how to successfully plan, carry out and report the results of a penetration test. You'll learn the process behind penetration testing, tools and techniques used by pentesters, legal and compliance issues and more.
ITIL 4 Foundations
ITIL 4 Foundations
The ITIL® 4 Foundations certification path teaches you best practices for aligning IT services with business goals. You'll learn about the ITIL framework, the four dimensions of service management, best practices for implementing ITIL and more.
Introduction to PenTest+
Introduction to PenTest+
This course serves as an introduction to the CompTIA PenTest+ certification.
Planning for an Engagement
Planning for an Engagement
Review the art of planning for a pentesting engagement with five videos on methodology, scoping and more.
Scoping an Engagement
Scoping an Engagement
Learn about scoping a pentesting engagement in six videos covering assessment types, target selection and more.
Information Gathering
Information Gathering
Ten videos take you through the many methods of information gathering, including scanning, enumeration, cryptographic inspection and eavesdropping. Includes demonstrations.
Vulnerability Scanning
Vulnerability Scanning
Review the process of vulnerability scanning, common vulnerability scanning tools and scan analysis with this four-video course.
Preparing for Exploitation
Preparing for Exploitation
Three videos help you prepare for exploitation with an in-depth review of common attack techniques, leveraging information for exploitation and weaknesses in specialized systems.
Social Engineering and Physical Attacks
Social Engineering and Physical Attacks
Social engineering takes center stage in this four-video course covering social engineering attack methods, motivation factors and physical security attacks.
Exploiting Network and Application Vulnerabilities
Exploiting Network and Application Vulnerabilities
Explore system weak points and methods of attack with this four-video course on exploiting network and application vulnerabilities.
Exploiting Host-based Vulnerabilities
Exploiting Host-based Vulnerabilities
Learn about host-based vulnerabilities in this five-video course covering privilege escalation and escalation techniques.
Post-exploitation Activities
Post-exploitation Activities
Take a look at post-exploitation activities with four videos on lateral movement, persistence and covering your tracks.
Using Nmap for Pentesting
Using Nmap for Pentesting
Get to grips with the power of Nmap in this three-video course on using Nmap for pentesting.
Use Cases of Pentesting Tools
Use Cases of Pentesting Tools
Explore pentesting tools with thirteen videos on Web proxies, debuggers, exploitation frameworks and more.
Basic Script Analysis
Basic Script Analysis
Brush up your knowledge of script analysis with six videos on the basics in Bash, Ruby, Python and more.
Reporting and Communication
Reporting and Communication
Make sure that critical findings reach the client with the help of this five-video course on reporting and communication.
PenTest+ Conclusion
PenTest+ Conclusion
Wrap up your survey of pentesting with a tutorial on setting up your home pentesting lab.
ITIL 4 Foundation Introduction
ITIL 4 Foundation Introduction
Learn about the role of the ITIL framework in managing IT service in the era of the 4th industrial revolution.
Service Management
Service Management
Understand the service management definitions and concepts that apply to ITIL as well as other frameworks.
Four Dimensions of Service Management
Four Dimensions of Service Management
Take a closer look at how the model based on the four dimensions of IT service management applies within ITIL.
Service Value System
Service Value System
Get an overview of the service value system and how the organization’s systems and components work together to enable value co-creation.
Guiding Principles
Guiding Principles
Discover the seven guiding principles organizations should consider while adapting ITIL guidance to their needs.
Service Value Chain
Service Value Chain
Get a breakdown of the different activities in the service value chain and how they interconnect.
Continual Improvement
Continual Improvement
Learn about the continual improvement model, its purpose and its place within the service value chain and the service value system.
Categories of Practices
Categories of Practices
Become aware of the 34 practices that support value chain activities within the ITIL framework.
Service Management Practices
Service Management Practices
Dive into the ITIL service management practices category, which includes 17 practices developed over 20-30 years.
Technical Management Practices
Technical Management Practices
Review the three ITIL technical management practices that have been adapted from technology management domains.
ITIL 4 Foundation Conclusion
ITIL 4 Foundation Conclusion
Wrap up your knowledge of ITIL foundations by putting together everything you’ve learned.