Home > Store

CCNP and CCIE Enterprise Core & CCNP Enterprise Advanced Routing Portable Command Guide: All ENCOR (350-401) and ENARSI (300-410) Commands in One Compact, Portable Resource

Register your product to gain access to bonus material or receive a coupon.

CCNP and CCIE Enterprise Core & CCNP Enterprise Advanced Routing Portable Command Guide: All ENCOR (350-401) and ENARSI (300-410) Commands in One Compact, Portable Resource

Best Value Purchase

Book + eBook Bundle

  • Your Price: $45.29
  • List Price: $77.98
  • Includes EPUB and PDF
  • About eBook Formats
  • This eBook includes the following formats, accessible from your Account page after purchase:

    ePub EPUB The open industry format known for its reflowable content and usability on supported mobile devices.

    Adobe Reader PDF The popular standard, used most often with the free Acrobat® Reader® software.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

More Purchase Options

Book

  • Your Price: $31.99
  • List Price: $39.99
  • Usually ships in 24 hours.

eBook

  • Your Price: $30.39
  • List Price: $37.99
  • Includes EPUB and PDF
  • About eBook Formats
  • This eBook includes the following formats, accessible from your Account page after purchase:

    ePub EPUB The open industry format known for its reflowable content and usability on supported mobile devices.

    Adobe Reader PDF The popular standard, used most often with the free Acrobat® Reader® software.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

About

Features

  • Maps to the latest version of the exam - great for review before exams without needing a computer connected to a Cisco device
  • All commands in a small, compact resource — makes it easy to carry as a reference in the workplace
  • Examples of how to use commands are given at the same time as the command is presented

Description

  • Copyright 2020
  • Dimensions: 6" x 9"
  • Pages: 416
  • Edition: 1st
  • Book
  • ISBN-10: 0-13-576816-0
  • ISBN-13: 978-0-13-576816-7

All ENCOR (350-401) and ENARSI (300-410) Commands in One Compact, Portable Resource
Use this fully updated quick reference resource to help memorize commands and concepts as you earn your CCNP or CCIE certification. Filled with valuable, easy-to-access information, it's portable enough to use anywhere.

This guide summarizes all Cisco IOS software commands, keywords, command arguments, and associated prompts associated with the CCNP and CCIE Enterprise Core (ENCOR 350-401) and CCNP Enterprise Advanced Routing and Services (ENARSI 300-410) certification exams. Tips and examples help you apply commands to real-world scenarios, and configuration samples show their use in network designs.
Coverage includes:

  • Layer 2: VLANs, STP, Inter-VLAN Routing
  • Layer 3: EIGRP, OSPF, Redistribution, Path Control, BGP
  • Infrastructure Services and Management
  • Infrastructure Security
  • Network Assurance
  • Wireless Security and Troubleshooting
  • Overlays and Virtualization

This Portable Command Guide provides:
  • Logical how-to topic groupings for a one-stop resource
  • Great for review before your ENCOR 350-401 and ENARSI 300-410 certification exams
  • Compact size makes it easy to carry with you wherever you go
  • Create Your Own Journal section with blank, lined pages enables you to personalize the book for your needs

This book is part of the Cisco Press Certification Self-Study Product Family, which offers readers a self-paced study routine for Cisco certification exams. Titles in the Cisco Press Certification Self-Study Product Family are part of a recommended learning program from Cisco that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press.

Sample Content

Table of Contents

Introduction     xix
PART I:  LAYER 2 INFRASTRUCTURE
Chapter 1  VLANs     1

Virtual LANs     1
    Creating Static VLANs Using VLAN Configuration Mode     2
    Assigning Ports to Data and Voice VLANs     2
    Using the range Command     3
    Dynamic Trunking Protocol (DTP)     3
    Setting the Trunk Encapsulation and Allowed VLANs     4
    VLAN Trunking Protocol (VTP)     5
    Verifying VTP     6
    Verifying VLAN Information     7
    Saving VLAN Configurations     7
    Erasing VLAN Configurations     7
    Configuration Example: VLANs     8
Layer 2 Link Aggregation     11
    Interface Modes in EtherChannel     12
    Default EtherChannel Configuration     12
    Guidelines for Configuring EtherChannel     12
    Configuring Layer 2 EtherChannel     14
    Configuring Layer 3 EtherChannel     14
    Configuring EtherChannel Load Balancing     15
    Configuring LACP Hot-Standby Ports     16
    Monitoring and Verifying EtherChannel     17
    Configuration Example: EtherChannel     18
Chapter 2  Spanning Tree Protocol     23
Spanning Tree Protocol Definition     24
Enabling Spanning Tree Protocol     24
Changing the Spanning-Tree Mode     25
Configuring the Root Switch     25
Configuring a Secondary Root Switch     26
Configuring Port Priority     26
Configuring the Path Cost     27
Configuring the Switch Priority of a VLAN     27
Configuring STP Timers     27
Configuring Optional Spanning-Tree Features     28
    PortFast     28
    BPDU Guard (2xxx/older 3xxx Series)     29
    BPDU Guard (3650/9xxx Series)     29
    BPDU Filter     30
    UplinkFast     30
    BackboneFast     31
    Root Guard     31
    Loop Guard     32
    Unidirectional Link Detection     33
Configuring and Verifying Port Error Conditions     33
Enabling Rapid Spanning Tree     36
Rapid Spanning Tree Link Types     36
Enabling Multiple Spanning Tree     37
Verifying the Extended System ID     39
Verifying STP     39
Troubleshooting Spanning Tree Protocol     40
Configuration Example: PVST+     40
Spanning-Tree Migration Example: PVST+ to Rapid-PVST+     43
Chapter 3  Implementing Inter-VLAN Routing     45
Inter-VLAN Communication Using an External Router: Router-on-a-Stick     45
Inter-VLAN Communication Tips     46
Inter-VLAN Communication on a Multilayer Switch Through a Switch Virtual Interface     46
    Configuring Inter-VLAN Communication on an L3 Switch     47
    Removing L2 Switchport Capability of an Interface on an L3 Switch     47
Configuration Example: Inter-VLAN Communication     47
Configuration Example: IPv6 Inter-VLAN Communication     55

PART II:  LAYER 3 INFRASTRUCTURE
Chapter 4  EIGRP     61

Enhanced Interior Gateway Routing Protocol (EIGRP)     62
Enabling EIGRP for IPv4 Using Classic Mode Configuration     62
Enabling EIGRP for IPv6 Using Classic Mode Configuration     63
EIGRP Using Named Mode Configuration     64
EIGRP Named Mode Subconfiguration Modes     66
Upgrading Classic Mode to Named Mode Configuration     66
EIGRP Router ID     67
Authentication for EIGRP     67
    Configuring Authentication in Classic Mode     67
    Configuring Authentication in Named Mode     68
    Verifying and Troubleshooting EIGRP Authentication     70
Auto-Summarization for EIGRP     70
IPv4 Manual Summarization for EIGRP     70
IPv6 Manual Summarization for EIGRP     71
Timers for EIGRP     71
Passive Interfaces for EIGRP     72
Pseudo Passive EIGRP Interfaces     72
Injecting a Default Route into EIGRP: Redistribution of a Static Route     73
Injecting a Default Route into EIGRP: ip default-network     74
Injecting a Default Route into EIGRP: Summarize to 0.0.0.0/0     74
Accepting Exterior Routing Information: default-information     75
Equal-cost Load Balancing: maximum-paths     75
Unequal-cost Load Balancing: variance     76
EIGRP Traffic Sharing     76
Bandwidth Use for EIGRP     77
Stub Routing for EIGRP     77
EIGRP Unicast Neighbors     79
EIGRP Wide Metrics     79
Adjusting the EIGRP Metric Weights     80
Verifying EIGRP     80
Troubleshooting EIGRP     82
Configuration Example: EIGRP for IPv4 and IPv6 Using Named Mode     83
Chapter 5  OSPF     87
Comparing OSPFv2 and OSPFv3     88
Configuring OSPF     89
Configuring Multiarea OSPF     89
Using Wildcard Masks with OSPF Areas     90
Configuring Traditional OSPFv3     91
    Enabling OSPF for IPv6 on an Interface     91
    OSPFv3 and Stub/NSSA Areas     92
    Interarea OSPFv3 Route Summarization     92
    Enabling an IPv4 Router ID for OSPFv3     93
    Forcing an SPF Calculation     93
OSPFv3 Address Families     93
    Configuring the IPv6 Address Family in OSPFv3     94
    Configuring the IPv4 Address Family in OSPFv3     94
    Applying Parameters in Address Family Configuration Mode     94
Authentication for OSPF     95
    Configuring OSPFv2 Authentication: Simple Password     95
    Configuring OSPFv2 Cryptographic Authentication: SHA-256     96
    Configuring OSPFv3 Authentication and Encryption     97
    Verifying OSPFv2 and OSPFv3 Authentication     98
Optimizing OSPF Parameters     98
    Loopback Interfaces     98
    Router ID     99
    DR/BDR Elections     99
    Passive Interfaces     100
    Modifying Cost Metrics     100
    OSPF Reference Bandwidth     101
    OSPF LSDB Overload Protection     101
    Timers     101
    IP MTU     102
Propagating a Default Route     102
Route Summarization     103
    Interarea Route Summarization     103
    External Route Summarization     103
OSPF Route Filtering     104
    Using the filter-list Command     104
    Using the area range not-advertise Command     104
    Using the distribute-list in Command     104
    Using the summary-address not-advertise Command     105
OSPF Special Area Types     105
    Stub Areas     105
    Totally Stubby Areas     106
    Not-So-Stubby Areas (NSSA)     106
    Totally NSSA     107
Virtual Links     108
    Configuration Example: Virtual Links     108
Verifying OSPF Configuration     109
Troubleshooting OSPF     111
Configuration Example: Single-Area OSPF     111
Configuration Example: Multiarea OSPF     114
Configuration Example: Traditional OSPFv3     117
Configuration Example: OSPFv3 with Address Families     120
Chapter 6  Redistribution and Path Control     127
Defining Seed and Default Metrics     128
Redistributing Connected Networks     129
Redistributing Static Routes     129
Redistributing Subnets into OSPF     130
Assigning E1 or E2 Routes in OSPF     130
Redistributing OSPF Internal and External Routes     131
Configuration Example: Route Redistribution for IPv4     131
Configuration Example: Route Redistribution for IPv6     132
Verifying Route Redistribution     134
Route Filtering Using the distribute-list Command     134
    Configuration Example: Inbound and Outbound Distribute List Route Filters     134
    Configuration Example: Controlling Redistribution with Outbound Distribute Lists     135
    Verifying Route Filters     136
Route Filtering Using Prefix Lists     137
    Configuration Example: Using a Distribute List That References a Prefix List to Control Redistribution     139
    Verifying Prefix Lists     140
Using Route Maps with Route Redistribution     140
    Configuration Example: Route Maps     141
Manipulating Redistribution Using Route Tagging     142
Changing Administrative Distance     143
Path Control with Policy-Based Routing     144
Verifying Policy-Based Routing     145
Configuration Example: PBR with Route Maps     146
Cisco IOS IP SLA     147
    Configuring Authentication for IP SLA     149
    Monitoring IP SLA Operations     150
PBR with Cisco IOS IP SLA     150
    Step 1: Define Probe(s)     151
    Step 2: Define Tracking Object(s)     152
    Step 3a: Define the Action on the Tracking Object(s)     152
    Step 3b: Define Policy Routing Using the Tracking Object(s)     152
    Step 4: Verify IP SLA Operations     152
Chapter 7  BGP     155
Configuring BGP: Classic Configuration     156
Configuring Multiprotocol BGP (MP-BGP)     157
Configuring BGP: Address Families     158
Configuration Example: Using MP-BGP Address Families to Exchange IPv4 and IPv6 Routes     159
BGP Support for 4-Byte AS Numbers     160
BGP Timers     161
BGP and update-source     161
IBGP Next-Hop Behavior     162
EBGP Multihop     162
Attributes     164
    Route Selection Decision ProcessThe BGP Best Path Algorithm     164
    Weight Attribute     164
    Using AS Path Access Lists to Manipulate the Weight Attribute     166
    Using Prefix Lists and Route Maps to Manipulate the Weight Attribute     166
    Local Preference Attribute     167
    Using AS Path Access Lists with Route Maps to Manipulate the Local Preference Attribute     167
    AS Path Attribute Prepending     169
    AS Path: Removing Private Autonomous Systems     171
    Multi-Exit Discriminator (MED) Attribute     171
Verifying BGP     174
Troubleshooting BGP     175
Default Routes     177
Route Aggregation     177
Route Reflectors     177
Regular Expressions     178
Regular Expressions: Examples     179
BGP Route Filtering Using Access Lists and Distribute Lists     180
Configuration Example: Using Prefix Lists and AS Path Access Lists     181
BGP Peer Groups     182
Authentication for BGP     184
    Configuring Authentication Between BGP Peers     184
    Verifying BGP Authentication     184

PART III:  INFRASTRUCTURE SERVICES
Chapter 8  IP Services     185

Network Address Translation (NAT)     186
    Private IP Addresses: RFC 1918     186
    Configuring Static NAT     187
    Configuring Dynamic NAT     188
    Configuring Port Address Translation (PAT)     189
    Configuring a NAT Virtual Interface     190
    Verifying NAT and PAT Configurations     190
    Troubleshooting NAT and PAT Configurations     191
    Configuration Example: PAT     191
    Configuration Example: NAT Virtual Interfaces and Static NAT     193
First-Hop Redundancy Protocols     194
    Hot Standby Router Protocol     194
    Virtual Router Redundancy Protocol     201
    IPv4 Configuration Example: HSRP on L3 Switch     204
    IPv4 Configuration Example: VRRPv2 on Router and L3 Switch with IP SLA Tracking     209
    IPv6 Configuration Example: HSRPv2 on Router and L3 Switch     212
Dynamic Host Control Protocol (DHCP)     217
    Implementing DHCP for IPv4     217
    Implementing DHCP for IPv6     221
    Configuration Example: DHCP for IPv4     224
    Configuration Example: DHCP for IPv6     226
Chapter 9  Device Management     231
Configuring Passwords     231
    Cleartext Password Encryption     232
Password Encryption Algorithm Types     233
    Configuring SSH     234
    Verifying SSH     235
Boot System Commands     235
The Cisco IOS File System     236
Viewing the Cisco IOS File System     236
Commonly Used URL Prefixes for Cisco Network Devices     236
Deciphering IOS Image Filenames     237
Backing Up Configurations to a TFTP Server     238
Restoring Configurations from a TFTP Server     238
Backing Up the Cisco IOS Software to a TFTP Server     239
Restoring/Upgrading the Cisco IOS Software from a TFTP Server     239
Restoring the Cisco IOS Software Using the ROM Monitor Environmental Variables and tftpdnld Command     240
Secure Copy Protocol (SCP)     241
    Configuring an SCP Server     241
    Verifying and Troubleshooting SCP     241
    Configuration Example: SCP     241
Disabling Unneeded Services     242
Useful Device Management Options     243

PART IV:  INFRASTRUCTURE SECURITY
Chapter 10  Infrastructure Security     245

IPv4 Access Control Lists (ACLs)     246
    Configuring and Applying Standard IPv4 ACLs     246
Configuring and Applying Extended IPv4 ACLs     247
    Configuring and Applying Time-based ACLs     248
    Configuring and Applying VTY ACLs     249
IPv6 ACLs     250
    Configuring and Applying IPv6 ACLs     250
    Verifying IPv4 and IPv6 ACLs     251
Implementing Authentication Methods     251
    Simple Local Database Authentication     252
    AAA-based Local Database Authentication     252
    RADIUS Authentication     253
    TACACS+ Authentication     255
    Configuring Authorization and Accounting     256
    Troubleshooting AAA     257
Control Plane Policing (CoPP)     257
    Step 1: Define ACLs to Identify Permitted CoPP Traffic Flows     258
    Step 2: Define Class Maps for Matched Traffic     258
    Step 3: Define a Policy Map to Police Matched Traffic     259
    Step 4: Assign a Policy Map to the Control Plane     259
    Verifying CoPP     260
Unicast Reverse Path Forwarding (uRPF)     260
    Configuring uRPF     260
    Verifying and Troubleshooting uRPF     260

PART V:  NETWORK ASSURANCE
Chapter 11  Network Assurance     261

Internet Control Message Protocol Redirect Messages     262
The ping Command     262
Examples of Using the ping and the Extended ping Commands     263
The traceroute Command     265
The debug Command     265
Conditionally Triggered Debugs     266
Configuring Secure SNMP     267
    Securing SNMPv1 or SNMPv2c     267
    Securing SNMPv3     268
    Verifying SNMP     269
Implementing Logging     269
    Configuring Syslog     269
    Syslog Message Format     269
    Syslog Severity Levels     270
    Syslog Message Example     270
Configuring NetFlow     271
Configuring Flexible NetFlow     272
    Step 1: Configure a Flow Record     272
    Step 2: Configure a Flow Exporter     272
    Step 3: Configure a Flow Monitor     272
    Step 4: Apply the Flow Monitor to an Interface     273
Verifying NetFlow     273
Implementing Port Mirroring     273
    Default SPAN and RSPAN Configuration     273
    Configuring Local SPAN     274
    Local SPAN Guidelines for Configuration     274
    Configuration Example: Local SPAN     274
    Configuring Remote SPAN     277
    Remote SPAN Guidelines for Configuration     278
    Configuration Example: Remote SPAN     278
    Configuring Encapsulated RSPAN (ERSPAN)     280
    Verifying and Troubleshooting Local and Remote SPAN     281
Configuring Network Time Protocol     281
    NTP Configuration     281
    NTP Design     282
    Securing NTP     284
    Verifying and Troubleshooting NTP     286
    Setting the Clock on a Router     286
    Using Time Stamps     290
    Configuration Example: NTP     290
Tool Command Language (Tcl)     294
Embedded Event Manager (EEM)     295
    EEM Configuration Examples     296
    EEM and Tcl Scripts     298
    Verifying EEM     298

PART VI:  WIRELESS
Chapter 12  Wireless Security and Troubleshooting     299

Authenticating Wireless Clients     299
    Open Authentication     300
    Authenticating with a Pre-shared Key     302
    Authenticating with EAP     304
    Authenticating with WebAuth     310
Troubleshooting from the Wireless LAN Controller     312
Troubleshooting Wireless Client Connectivity     318
    Cisco AireOS Monitoring Dashboard GUI     318
    Cisco IOS XE GUI     322

PART VII:  OVERLAYS AND VIRTUALIZATION
Chapter 13  Overlay Tunnels and VRF     325

Generic Routing Encapsulation (GRE)     325
    Configuring an IPv4 GRE Tunnel     326
    Configuring an IPv6 GRE Tunnel     326
    Verifying IPv4 and IPv6 GRE Tunnels     327
    Configuration Example: IPv4 and IPv6 GRE Tunnels with OSPFv3     327
Site-to-Site GRE over IPsec     331
    GRE/IPsec Using Crypto Maps     332
    GRE/IPsec Using IPsec Profiles     333
    Verifying GRE/IPsec     335
Site-to-Site Virtual Tunnel Interface (VTI) over IPsec     335
Cisco Dynamic Multipoint VPN (DMVPN)     336
    Configuration Example: Cisco DMVPN for IPv4     337
    Verifying Cisco DMVPN     342
VRF-Lite     343
    Configuring VRF-Lite     343
    Verifying VRF-Lite     345

Appendix A:  Create Your Own Journal Here     347
Index     361

Updates

Errata

We've made every effort to ensure the accuracy of this book and its companion content. Any errors that have been confirmed since this book was published can be downloaded below.

Download the errata (172 KB .doc)

Submit Errata

More Information

Pearson IT Certification Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Pearson IT Certification and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about Pearson IT Certification products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites; develop new products and services; conduct educational research; and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by Adobe Press. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.pearsonitcertification.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020