About Us
Pearson IT Certification is the leader in IT certification learning solutions, with a long tradition of delivering proven learning tools and educational training materials that have helped certification exam candidates succeed. Learn from world-renowned authors such as Wendell Odom, Sander van Vugt, David Prowse, Kevin Wallace, and Omar Santos and a suite of products and solutions that address the learning, preparation, and practice needs of a new generation of certification candidate.
Pearson has formal publishing partnerships with leaders in technology, including the official publishing programs of Adobe Press and Cisco Press. Pearson is also the official distributor for Microsoft Press.
Exam Profiles
Exam profiles are the perfect tool to help you prepare for your next exam. Learn exam details, tips and tricks, recommended study resources, and much more.
- Exam Profile: Cisco 200-301 CCNA
- Wendell Odom explains the differences between the outgoing CCENT/CCNA exams and the new consolidated CCNA 200-301 exam, gives context for the exam as a stepping stone, and recommends additional study resources.
- Exam Profile: CompTIA A+ Core 1 (220-1001) & CompTIA A+ Core 2 (220-1002)
- David L. Prowse walks through exam details, highlights trouble spots, offers preparation hints, recommends study resources, and suggests next steps for the CompTIA A+ Core exams.
Articles
- AWS Artificial Intelligence and Data Analytics Services
- In this chapter, dive into two of today's hottest topics in the IT industry, artificial intelligence and machine learning (AI/ML) services and data analytics services in AWS.
- Risk Management
- This chapter covers the following official Security+ exam objective: 5.2 Explain elements of the risk management process. You will learn the steps of the process, from risk identification and assessment, to risk management strategies and risk reporting.
- Understanding Change Management's Security Impact
- This chapter examines the critical role of change management processes in fortifying an organization's cybersecurity posture. Change management minimizes unplanned outages due to unauthorized alterations by helping to manage cybersecurity and operational risks.
- Threats to Security
- In this chapter, we will look at the various types of threats to security and why it's essential to understand them, common threat types and mitigations, advanced techniques used by threat actors, and ways to discover and mitigate vulnerabilities. Coverage includes DDoS, IDS, and IPS, based on Certified in Cybersecurity exam objective 4.2.
Quick Links | ||
Certifications |
Learning Products |
Site Features |
- CEH Certified Ethical Hacker Cert Guide Premium Edition and Practice Test
- Sale Price: $34.99
- You Save 50%
- Learn More
- Buy
- UiPath Certified Professional (Video Collection)
- Sale Price: $119.99
- You Save 66%
- Learn More
- Buy