Home > Articles > Cisco > CCIE

Like this article? We recommend

Exam Objectives

The exam is closed book and no outside reference materials are allowed. The following topics are general guidelines for the content that is likely to be included on the practical exam. However, other related topics may also appear on any specific delivery of the exam. To better reflect the contents of the exam and for clarity purposes, the following guidelines may change at any time without notice.

The following list provides general guidelines for the content most likely to be included on the exam. In any given exam, it may not contain questions representative of each subpoint. They are all possible, however.

1.0 Network Principles - 10%

  • 1.1 Network theory
    • 1.1.a Describe basic software architecture differences between IOS and IOS XE
      • 1.1.a (i) Control plane and Forwarding plane
      • 1.1.a (ii) Impact to troubleshooting and performances
      • 1.1.a (iii) Excluding specific platform's architecture
    • 1.1.b Identify Cisco express forwarding concepts
      • 1.1.b (i) RIB, FIB, LFIB, Adjacency table
      • 1.1.b (ii) Load balancing Hash
      • 1.1.b (iii) Polarization concept and avoidance
    • 1.1.c Explain general network challenges
      • 1.1.c (i) Unicast flooding
      • 1.1.c (ii) Out of order packets
      • 1.1.c (iii) Asymmetric routing
      • 1.1.c (iv) Impact of micro burst
    • 1.1.d Explain IP operations
      • 1.1.d (i) ICMP unreachable, redirect
      • 1.1.d (ii) IPv4 options, IPv6 extension headers
      • 1.1.d (iii) IPv4 and IPv6 fragmentation
      • 1.1.d (iv) TTL
      • 1.1.d (v) IP MTU
    • 1.1.e Explain TCP operations
      • 1.1.e (i) IPv4 and IPv6 PMTU
      • 1.1.e (ii) MSS
      • 1.1.e (iii) Latency
      • 1.1.e (iv) Windowing
      • 1.1.e (v) Bandwidth delay product
      • 1.1.e (vi) Global synchronization
      • 1.1.e (vii) Options
    • 1.1.f Explain UDP operations
      • 1.1.f (i) Starvation
      • 1.1.f (ii) Latency
      • 1.1.f (iii) RTP/RTCP concepts
  • 1.2 Network implementation and operation
    • 1.2.a Evaluate proposed changes to a network
      • 1.2.a (i) Changes to routing protocol parameters
      • 1.2.a (ii) Migrate parts of a network to IPv6
      • 1.2.a (iii) Routing protocol migration
      • 1.2.a (iv) Adding multicast support
      • 1.2.a (v) Migrate spanning tree protocol
      • 1.2.a (vi) Evaluate impact of new traffic on existing QoS design
  • 1.3 Network troubleshooting
    • 1.3.a Use IOS troubleshooting tools
      • 1.3.a (i) Debug, conditional debug
      • 1.3.a (ii) Ping, traceroute with extended options
      • 1.3.a (iii) Embedded packet capture
      • 1.3.a (iv) Performance monitor
    • 1.3.b Apply troubleshooting methodologies
      • 1.3.b (i) Diagnose the root cause of networking issue
        (analyze symptoms, identify and describe root cause)
      • 1.3.b (ii) Design and implement valid solutions according to constraints
      • 1.3.b (iii) Verify and monitor resolution
    • 1.3.c Interpret packet capture
      • 1.3.c (i) Using Wireshark trace analyzer
      • 1.3.c (ii) Using IOS embedded packet capture

2.0 Layer 2 Technologies - 15%

  • 2.1 LAN switching technologies
    • 2.1.a Implement and troubleshoot switch administration
      • 2.1.a (i) Managing MAC address table
      • 2.1.a (ii) errDisable recovery
      • 2.1.a (iii) L2 MTU
    • 2.1.b Implement and troubleshoot Layer 2 protocols
      • 2.1.b (i) CDP, LLDP
      • 2.1.b (ii) UDLD
    • 2.1.c Implement and troubleshoot VLAN
      • 2.1.c (i) Access ports
      • 2.1.c (ii) VLAN database
      • 2.1.c (iii) Normal, extended VLAN, voice VLAN
    • 2.1.d Implement and troubleshoot trunking
      • 2.1.d (i) VTPv1, VTPv2, VTPv3, VTP pruning
      • 2.1.d (ii) dot1Q
      • 2.1.d (iii) Native VLAN
      • 2.1.d (iv) Manual pruning
    • 2.1.e Implement and troubleshoot EtherChannel
      • 2.1.e (i) LACP, PAgP, manual
      • 2.1.e (ii) Layer 2, Layer 3
      • 2.1.e (iii) Load-balancing
      • 2.1.e (iv) EtherChannel misconfiguration guard
    • 2.1.f Implement and troubleshoot spanning tree
      • 2.1.f (i) PVST+/RPVST+/MST
      • 2.1.f (ii) Switch priority, port priority, path cost, STP timers
      • 2.1.f (iii) Port fast, BPDUguard, BPDUfilter
      • 2.1.f (iv) Loopguard, rootguard
    • 2.1.g Implement and troubleshoot other LAN switching technologies
      • 2.1.g (i) SPAN, RSPAN, ERSPAN
    • 2.1.h Describe chassis virtualization and aggregation technologies
      • 2.1.h (i) Multichassis
      • 2.1.h (ii) VSS concepts
      • 2.1.h (iii) Alternative to STP
      • 2.1.h (iv) Stackwise
      • 2.1.h (v) Excluding specific platform implementation
    • 2.1.i Describe spanning-tree concepts
      • 2.1.i (i) Compatibility between MST and RSTP
      • 2.1.i (ii) STP dispute, STP bridge assurance
  • 2.2 Layer 2 multicast
    • 2.2.a Implement and troubleshoot IGMP
      • 2.2.a (i) IGMPv1, IGMPv2, IGMPv3
      • 2.2.a (ii) IGMP snooping
      • 2.2.a (iii) IGMP querier
      • 2.2.a (iv) IGMP filter
      • 2.2.a (v) IGMP proxy 
    • 2.2.b Explain MLD
    • 2.2.c Explain PIM snooping
  • 2.3 Layer 2 WAN circuit technologies
    • 2.3.a Implement and troubleshoot HDLC 
    • 2.3.b Implement and troubleshoot PPP
      • 2.3.b (i) Authentication (PAP, CHAP)
      • 2.3.b (ii) PPPoE
      • 2.3.b (iii) MLPPP 
    • 2.3.c Describe WAN rate-based ethernet circuits
      • 2.3.c (i) Metro and WAN Ethernet topologies
      • 2.3.c (ii) Use of rate-limited WAN ethernet services

3.0 Layer 3 Technologies - 40%

  • 3.1 Addressing technologies
    • 3.1.a Identify, implement and troubleshoot IPv4 addressing and subnetting
      • 3.1.a (i) Address types, VLSM
      • 3.1.a (ii) ARP
    • 3.1.b Identify, implement, and troubleshoot IPv6 addressing and subnetting
      • 3.1.b (i) Unicast, multicast
      • 3.1.b (ii) EUI-64
      • 3.1.b (iii) ND, RS/RA
      • 3.1.b (iv) Autoconfig/SLAAC, temporary addresses (RFC4941)
      • 3.1.b (v) Global prefix configuration feature
      • 3.1.b (vi) DHCP protocol operations
      • 3.1.b (vii) SLAAC/DHCPv6 interaction
      • 3.1.b (viii) Stateful, stateless DHCPv6
      • 3.1.b (ix) DHCPv6 prefix delegation 
  • 3.2 Layer 3 multicast
    • 3.2.a Troubleshoot reverse path forwarding
      • 3.2.a (i) RPF failure
      • 3.2.a (ii) RPF failure with tunnel interface
    • 3.2.b Implement and troubleshoot IPv4 protocol independent multicast
      • 3.2.b (i) PIM dense mode, sparse mode, sparse-dense mode
      • 3.2.b (ii) Static RP, auto-RP, BSR
      • 3.2.b (iii) Bidirectional PIM
      • 3.2.b (iv) Source-specific multicast
      • 3.2.b (v) Group to RP mapping
      • 3.2.b (vi) Multicast boundary
    • 3.2.c Implement and troubleshoot multicast source discovery protocol
      • 3.2.c (i) Intradomain MSDP (anycast RP)
      • 3.2.c (ii) SA filter
    • 3.2.d Describe IPv6 multicast
      • 3.2.d (i) IPv6 multicast addresses
      • 3.2.d (ii) PIMv6
  • 3.3 Fundamental routing concepts
    • 3.3.a Implement and troubleshoot static routing
    • 3.3.b Implement and troubleshoot default routing
    • 3.3.c Compare routing protocol types
      • 3.3.c (i) Distance vector
      • 3.3.c (ii) Link state
      • 3.3.c (iii) Path vector
    • 3.3.d Implement, optimize, and troubleshoot administrative distance
    • 3.3.e Implement and troubleshoot passive interface
    • 3.3.f Implement and troubleshoot VRF lite
    • 3.3.g Implement, optimize, and troubleshoot filtering with any routing protocol
    • 3.3.h Implement, optimize, and troubleshoot redistribution between any routing protocol
    • 3.3.i Implement, optimize, and troubleshoot manual and auto summarization with any routing protocol
    • 3.3.j Implement, optimize, and troubleshoot policy-based routing
    • 3.3.k Identify and troubleshoot suboptimal routing
    • 3.3.l Implement and troubleshoot bidirectional forwarding detection
    • 3.3.m Implement and troubleshoot loop prevention mechanisms
      • 3.3.m (i) Route tagging, filtering
      • 3.3.m (ii) Split horizon
      • 3.3.m (iii) Route poisoning
    • 3.3.n Implement and troubleshoot routing protocol authentication
      • 3.3.n (i) MD5
      • 3.3.n (ii) Key-chain
      • 3.3.n (iii) EIGRP HMAC SHA2-256bit
      • 3.3.n (iv) OSPFv2 SHA1-196bit
      • 3.3.n (v) OSPFv3 IPsec authentication
  • 3.4 RIP (v2 and v6)
    • 3.4.a Implement and troubleshoot RIPv2
    • 3.4.b Describe RIPv6 (RIPng) 
  • 3.5 EIGRP (for IPv4 and IPv6)
    • 3.5.a Describe packet types
      • 3.5.a (i) Packet types (hello, query, update, and such)
      • 3.5.a (ii) Route types (internal, external)
    • 3.5.b Implement and troubleshoot neighbor relationship
      • 3.5.b (i) Multicast, unicast EIGRP peering
      • 3.5.b (ii) OTP point-to-point peering
      • 3.5.b (iii) OTP route-reflector peering
      • 3.5.b (iv) OTP multiple service providers scenario
    • 3.5.c Implement and troubleshoot loop-free path selection
      • 3.5.c (i) RD, FD, FC, successor, feasible successor
      • 3.5.c (ii) Classic metric
      • 3.5.c (iii) Wide metric
    • 3.5.d Implement and troubleshoot operations
      • 3.5.d (i) General operations
      • 3.5.d (ii) Topology table, update, query, active, passive
      • 3.5.d (iii) Stuck in active
      • 3.5.d (iv) Graceful shutdown
    • 3.5.e Implement and troubleshoot EIGRP stub
      • 3.5.e (i) Stub
      • 3.5.e (ii) Leak-map
    • 3.5.f Implement and troubleshoot load-balancing
      • 3.5.f (i) equal-cost
      • 3.5.f (ii) unequal-cost
      • 3.5.f (iii) add-path
    • 3.5.g Implement EIGRP (multi-address) named mode
      • 3.5.g (i) Types of families
      • 3.5.g (ii) IPv4 address-family
      • 3.5.g (iii) IPv6 address-family
    • 3.5.h Implement, troubleshoot, and optimize EIGRP convergence and scalability
      • 3.5.h (i) Describe fast convergence requirements
      • 3.5.h (ii) Control query boundaries
      • 3.5.h (iii) IP FRR/fast reroute (single hop)
      • 3.5.h (iv) Summary leak-map
      • 3.5.h (v) Summary metric
  • 3.6OSPF (v2 and v3)
    • 3.6.a Describe packet types
      • 3.6.a (i) LSA types (1, 2, 3, 4, 5, 7, 9)
      • 3.6.a (ii) Route types (N1, N2, E1, E2) 
    • 3.6.b Implement and troubleshoot neighbor relationship
    • 3.6.c Implement and troubleshoot OSPFv3 address-family support
      • 3.6.c (i) IPv4 address-family
      • 3.6.c (ii) IPv6 address-family
    • 3.6.d Implement and troubleshoot network types, area types, and router types
      • 3.6.d (i) Point-to-point, multipoint, broadcast, nonbroadcast
      • 3.6.d (ii) LSA types, area type: backbone, normal, transit, stub, NSSA, totally stub
      • 3.6.d (iii) Internal router, ABR, ASBR
      • 3.6.d (iv) Virtual link
    • 3.6.e Implement and troubleshoot path preference
    • 3.6.f Implement and troubleshoot operations
      • 3.6.f (i) General operations
      • 3.6.f (ii) Graceful shutdown
      • 3.6.f (iii) GTSM (Generic TTL Security Mechanism)
    • 3.6.g Implement, troubleshoot, and optimize OSPF convergence and scalability
      • 3.6.g (i) Metrics
      • 3.6.g (ii) LSA throttling, SPF tuning, fast hello
      • 3.6.g (iii) LSA propagation control (area types, ISPF)
      • 3.6.g (iv) IP FRR/fast reroute (single hop)
      • 3.6.g (v) LFA/loop-free alternative (multihop)
      • 3.6.g (vi) OSPFv3 prefix suppression
  • 3.7BGP
    • 3.7.a Describe, implement, and troubleshoot peer relationships
      • 3.7.a (i) Peer-group, template
      • 3.7.a (ii) Active, passive
      • 3.7.a (iii) States, timers
      • 3.7.a (iv) Dynamic neighbors
    • 3.7.b Implement and troubleshoot IBGP and EBGP
      • 3.7.b (i) EBGP, IBGP
      • 3.7.b (ii) 4 bytes AS number
      • 3.7.b (iii) Private AS
    • 3.7.c Explain attributes and best-path selection
    • 3.7.d Implement, optimize, and troubleshoot routing policies
      • 3.7.d (i) Attribute manipulation
      • 3.7.d (ii) Conditional advertisement
      • 3.7.d (iii) Outbound route filtering
      • 3.7.d (iv) Communities, extended communities
      • 3.7.d (v) Multihoming
    • 3.7.e Implement and troubleshoot scalability
      • 3.7.e (i) Route-reflector, cluster
      • 3.7.e (ii) Confederations
      • 3.7.e (iii) Aggregation, AS set
    • 3.7.f Implement and troubleshoot multiprotocol BGP
      • 3.7.f (i) IPv4, IPv6, VPN address-family
    • 3.7.g Implement and troubleshoot AS path manipulations
      • 3.7.g (i) Local AS, allow AS in, remove private AS
      • 3.7.g (ii) Prepend
      • 3.7.g (iii) Regexp
    • 3.7.h Implement and troubleshoot other features
      • 3.7.h (i) Multipath
      • 3.7.h (ii) BGP synchronization
      • 3.7.h (iii) Soft reconfiguration, route refresh
    • 3.7.i Describe BGP fast convergence features
      • 3.7.i (i) Prefix independent convergence
      • 3.7.i (ii) Add-path
      • 3.7.i (iii) Next-hop address tracking
  • 3.8ISIS (for IPv4 and IPv6)
    • 3.8.a Describe basic ISIS network
      • 3.8.a (i) Single area, single topology
    • 3.8.b Describe neighbor relationship
    • 3.8.c Describe network types, levels and router types
      • 3.8.c (i) NSAP addressing
      • 3.8.c (ii) Point-to-point, broadcast
    • 3.8.d Describe operations
    • 3.8.e Describe optimization features
      • 3.8.e (i) Metrics, wide metric

4.0 VPN Technologies - 15%

  • 4.1Tunneling
    • 4.1.a Implement and troubleshoot MPLS operations
      • 4.1.a (i) Label stack, LSR, LSP
      • 4.1.a (ii) LDP
      • 4.1.a (iii) MPLS ping, MPLS traceroute
    • 4.1.b Implement and troubleshoot basic MPLS L3VPN
      • 4.1.b (i) L3VPN, CE, PE, P
      • 4.1.b (ii) Extranet (route leaking)
    • 4.1.c Implement and troubleshoot encapsulation
      • 4.1.c (i) GRE
      • 4.1.c (ii) Dynamic GRE
      • 4.1.c (iii) LISP encapsulation principles supporting EIGRP OTP
    • 4.1.d Implement and troubleshoot DMVPN (single hub)
      • 4.1.d (i) NHRP
      • 4.1.d (ii) DMVPN with IPsec using preshared key
      • 4.1.d (iii) QoS profile
      • 4.1.d (iv) Preclassify
    • 4.1.e Describe IPv6 tunneling techniques
      • 4.1.e (i) 6in4, 6to4
      • 4.1.e (ii) ISATAP
      • 4.1.e (iii) 6RD
      • 4.1.e (iv) 6PE/6VPE
    • 4.1.g Describe basic Layer 2 VPN - wireline
      • 4.1.g (i) L2TPv3 general principals
      • 4.1.g (ii) ATOM general principals
    • 4.1.h Describe basic L2VPN - LAN services
      • 4.1.h (i) MPLS-VPLS general principals
      • 4.1.h (ii) OTV general principals
  • 4.2Encryption
    • 4.2.a Implement and troubleshoot IPsec with preshared key
      • 4.2.a (i) IPv4 site to IPv4 site
      • 4.2.a (ii) IPv6 in IPv4 tunnels
      • 4.2.a (iii) Virtual tunneling Interface (VTI)
    • 4.2.b Describe GET VPN

5.0 Infrastructure Security - 5%

  • 5.1Device security
    • 5.1.a Implement and troubleshoot IOS AAA using local database
    • 5.1.b Implement and troubleshoot device access control
      • 5.1.b (i) Lines (VTY, AUX, console)
      • 5.1.b (ii) SNMP
      • 5.1.b (iii) Management plane protection
      • 5.1.b (iv) Password encryption
    • 5.1.c Implement and troubleshoot control plane policing
    • 5.1.d Describe device security using IOS AAA with TACACS+ and RADIUS
      • 5.1.d (i) AAA with TACACS+ and RADIUS
      • 5.1.d (ii) Local privilege authorization fallback
  • 5.2Network security
    • 5.2.a Implement and troubleshoot switch security features
      • 5.2.a (i) VACL, PACL
      • 5.2.a (ii) Stormcontrol
      • 5.2.a (iii) DHCP snooping
      • 5.2.a (iv) IP source-guard
      • 5.2.a (v) Dynamic ARP inspection
      • 5.2.a (vi) port-security
      • 5.2.a (vii) Private VLAN
    • 5.2.b Implement and troubleshoot router security features
      • 5.2.b (i) IPv4 access control lists (standard, extended, time-based)
      • 5.2.b (ii) IPv6 traffic filter
      • 5.2.b (iii) Unicast reverse path forwarding
    • 5.2.c Implement and troubleshoot IPv6 first-hop security
      • 5.2.c (i) RA guard
      • 5.2.c (ii) DHCP guard
      • 5.2.c (iii) Binding table
      • 5.2.c (iv) Device tracking
      • 5.2.c (v) ND inspection/snooping
      • 5.2.c (vii) Source guard
      • 5.2.c (viii) PACL
    • 5.2.d Describe 802.1x
      • 5.2.d (i) 802.1x, EAP, RADIUS
      • 5.2.d (ii) MAC authentication bypass

6.0 Infrastructure Services - 15%

  • 6.1 System management
    • 6.1.a Implement and troubleshoot device management
      • 6.1.a (i) Console and VTY
      • 6.1.a (ii) Telnet, HTTP, HTTPS, SSH, SCP
      • 6.1.a (iii)(T) FTPd
    • 6.1.b Implement and troubleshoot SNMP
      • 6.1.b (i)v2c, v3
    • 6.1.c Implement and troubleshoot logging
      • 6.1.c (i) Local logging, syslog, debug, conditional debug
      • 6.1.c (ii) Timestamp
  • 6.2 Quality of service
    • 6.2.a Implement and troubleshoot end-to-end QoS
      • 6.2.a (i) CoS and DSCP mapping
    • 6.2.b Implement, optimize, and troubleshoot QoS using MQC
      • 6.2.b (i) Classification
      • 6.2.b (ii) Network-based application recognition (NBAR)
      • 6.2.b (iii) Marking using IP precedence, DSCP, CoS, ECN
      • 6.2.b (iv) Policing, shaping
      • 6.2.b (v) Congestion management (queuing)
      • 6.2.b (vi) HQoS, subrate Ethernet link
      • 6.2.b (vii) Congestion avoidance (WRED)
    • 6.2.c Describe layer 2 QoS
      • 6.2.c (i) Queuing, scheduling
      • 6.2.c (ii) Classification, marking
  • 6.3 Network services
    • 6.3.a Implement and troubleshoot first-hop redundancy protocols
      • 6.3.a (i) HSRP, GLBP, VRRP
      • 6.3.a (ii) Redundancy using IPv6 RS/RA
    • 6.3.b Implement and troubleshoot network time protocol
      • 6.3.b (i) NTP master, client, version 3, version 4
      • 6.3.b (ii) NTP Authentication
    • 6.3.c Implement and troubleshoot IPv4 and IPv6 DHCP
      • 6.3.c (i) DHCP client, IOS DHCP server, DHCP relay
      • 6.3.c (ii) DHCP options
      • 6.3.c (iii) DHCP protocol operations
      • 6.3.c (iv) SLAAC/DHCPv6 interaction
      • 6.3.c (v) Stateful, stateless DHCPv6
      • 6.3.c (vi) DHCPv6 prefix delegation
    • 6.3.d Implement and troubleshoot IPv4 network address translation
      • 6.3.d (i) Static NAT, dynamic NAT, policy-based NAT, PAT
      • 6.3.d (ii) NAT ALG
    • 6.3.e Describe IPv6 network address translation
      • 6.3.e (i) NAT64
      • 6.3.e (ii) NPTv6
  • 6.4 Network optimization
    • 6.4.a Implement and troubleshoot IP SLA
      • 6.4.a (i) ICMP, UDP, Jitter, VoIP
    • 6.4.b Implement and troubleshoot tracking object
      • 6.4.b (i) Tracking object, tracking list
      • 6.4.b (ii) Tracking different entities (e.g. interfaces, routes, IPSLA, and such)
    • 6.4.c Implement and troubleshoot netflow
      • 6.4.c (i) Netflow v5, v9
      • 6.4.c (ii) Local retrieval
      • 6.4.c (iii) Export (configuration only)
    • 6.4.d Implement and troubleshoot embedded event manager
      • 6.4.d (i) EEM policy using applet
    • 6.4.e Identify performance routing (PfR)
      • 6.4.e (i) Basic load balancing
      • 6.4.e (ii) Voice optimization

Pearson IT Certification Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Pearson IT Certification and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about Pearson IT Certification products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites; develop new products and services; conduct educational research; and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by Adobe Press. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.pearsonitcertification.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020