Jason Dion

Lead Instructor, Dion Training Solutions

Jason Dion specializes in providing actionable information you can use to further your cybersecurity and information technology career. His IT certification and training courses teach you real-world application of the skills needed to face today's cybersecurity challenges.

Dion is an instructor at Liberty University’s College of Engineering and Computational Science and Anne Arundel Community College’s Department of Computing Technologies with multiple information technology professional certifications, including Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Certified Network Defense Architect (CNDA), Digital Forensic Examiner (DFE), Digital Media Collector (DMC), Security+, Network+, A+, PRINCE2, PRINCE2 Agile and ITIL.

Content from Jason Dion

CompTIA PenTest+
Learning Path
CompTIA PenTest+

CompTIA PenTest+

The CompTIA PenTest+ certification path teaches you how to successfully plan, carry out and report the results of a penetration test. You'll learn the process behind penetration testing, tools and techniques used by pentesters, legal and compliance issues and more.

ITIL 4 Foundations
Learning Path
ITIL 4 Foundations

ITIL 4 Foundations

The ITIL® 4 Foundations certification path teaches you best practices for aligning IT services with business goals. You'll learn about the ITIL framework, the four dimensions of service management, best practices for implementing ITIL and more.

Introduction to PenTest+
Course
Introduction to PenTest+

Introduction to PenTest+

This course serves as an introduction to the CompTIA PenTest+ certification.

Planning for an Engagement
Course
Planning for an Engagement

Planning for an Engagement

Review the art of planning for a pentesting engagement with five videos on methodology, scoping and more.

Scoping an Engagement
Course
Scoping an Engagement

Scoping an Engagement

Learn about scoping a pentesting engagement in six videos covering assessment types, target selection and more.

Information Gathering
Course
Information Gathering

Information Gathering

Ten videos take you through the many methods of information gathering, including scanning, enumeration, cryptographic inspection and eavesdropping. Includes demonstrations.

Vulnerability Scanning
Course
Vulnerability Scanning

Vulnerability Scanning

Review the process of vulnerability scanning, common vulnerability scanning tools and scan analysis with this four-video course.

Preparing for Exploitation
Course
Preparing for Exploitation

Preparing for Exploitation

Three videos help you prepare for exploitation with an in-depth review of common attack techniques, leveraging information for exploitation and weaknesses in specialized systems.

Social Engineering and Physical Attacks
Course
Social Engineering and Physical Attacks

Social Engineering and Physical Attacks

Social engineering takes center stage in this four-video course covering social engineering attack methods, motivation factors and physical security attacks.

Exploiting Network and Application Vulnerabilities
Course
Exploiting Network and Application Vulnerabilities

Exploiting Network and Application Vulnerabilities

Explore system weak points and methods of attack with this four-video course on exploiting network and application vulnerabilities.

Exploiting Host-based Vulnerabilities
Course
Exploiting Host-based Vulnerabilities

Exploiting Host-based Vulnerabilities

Learn about host-based vulnerabilities in this five-video course covering privilege escalation and escalation techniques.

Post-exploitation Activities
Course
Post-exploitation Activities

Post-exploitation Activities

Take a look at post-exploitation activities with four videos on lateral movement, persistence and covering your tracks.

Using Nmap for Pentesting
Course
Using Nmap for Pentesting

Using Nmap for Pentesting

Get to grips with the power of Nmap in this three-video course on using Nmap for pentesting.

Use Cases of Pentesting Tools
Course
Use Cases of Pentesting Tools

Use Cases of Pentesting Tools

Explore pentesting tools with thirteen videos on Web proxies, debuggers, exploitation frameworks and more.

Basic Script Analysis
Course
Basic Script Analysis

Basic Script Analysis

Brush up your knowledge of script analysis with six videos on the basics in Bash, Ruby, Python and more.

Reporting and Communication
Course
Reporting and Communication

Reporting and Communication

Make sure that critical findings reach the client with the help of this five-video course on reporting and communication.

PenTest+ Conclusion
Course
PenTest+ Conclusion

PenTest+ Conclusion

Wrap up your survey of pentesting with a tutorial on setting up your home pentesting lab.

ITIL 4 Foundation Introduction
Course
ITIL 4 Foundation Introduction

ITIL 4 Foundation Introduction

Learn about the role of the ITIL framework in managing IT service in the era of the 4th industrial revolution.

Service Management
Course
Service Management

Service Management

Understand the service management definitions and concepts that apply to ITIL as well as other frameworks.

Four Dimensions of Service Management
Course
Four Dimensions of Service Management

Four Dimensions of Service Management

Take a closer look at how the model based on the four dimensions of IT service management applies within ITIL.

Service Value System
Course
Service Value System

Service Value System

Get an overview of the service value system and how the organization’s systems and components work together to enable value co-creation.

Guiding Principles
Course
Guiding Principles

Guiding Principles

Discover the seven guiding principles organizations should consider while adapting ITIL guidance to their needs.

Service Value Chain
Course
Service Value Chain

Service Value Chain

Get a breakdown of the different activities in the service value chain and how they interconnect.

Continual Improvement
Course
Continual Improvement

Continual Improvement

Learn about the continual improvement model, its purpose and its place within the service value chain and the service value system.

Categories of Practices
Course
Categories of Practices

Categories of Practices

Become aware of the 34 practices that support value chain activities within the ITIL framework.

Service Management Practices
Course
Service Management Practices

Service Management Practices

Dive into the ITIL service management practices category, which includes 17 practices developed over 20-30 years.

Technical Management Practices
Course
Technical Management Practices

Technical Management Practices

Review the three ITIL technical management practices that have been adapted from technology management domains.

ITIL 4 Foundation Conclusion
Course
ITIL 4 Foundation Conclusion

ITIL 4 Foundation Conclusion

Wrap up your knowledge of ITIL foundations by putting together everything you’ve learned.

Exceptional learning experiences powered by LX Labs cyber expertise

Infosec Skills courses and labs are powered by LX Labs — our elite team of cyber SMEs, learning specialists and community of top-ranked security instructors, published authors and sought-after industry leaders. We rigorously vet all Infosec Skills training resources to guarantee they meet certification and compliance requirements and align with recognized guidelines like the NICE Cybersecurity Workforce Framework.