Home > Store

Networking Essentials Companion Guide

Register your product to gain access to bonus material or receive a coupon.

Networking Essentials Companion Guide

Best Value Purchase

Book + eBook Bundle

  • Your Price: $98.10
  • List Price: $165.99
  • Includes EPUB and PDF
  • About eBook Formats
  • This eBook includes the following formats, accessible from your Account page after purchase:

    ePub EPUB The open industry format known for its reflowable content and usability on supported mobile devices.

    Adobe Reader PDF The popular standard, used most often with the free Acrobat® Reader® software.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

More Purchase Options

Book

  • Your Price: $68.00
  • List Price: $80.00
  • Usually ships in 24 hours.

eBook

  • Your Price: $73.09
  • List Price: $85.99
  • Includes EPUB and PDF
  • About eBook Formats
  • This eBook includes the following formats, accessible from your Account page after purchase:

    ePub EPUB The open industry format known for its reflowable content and usability on supported mobile devices.

    Adobe Reader PDF The popular standard, used most often with the free Acrobat® Reader® software.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

Description

  • Copyright 2022
  • Dimensions: 8" x 9-1/8"
  • Pages: 544
  • Edition: 1st
  • Book
  • ISBN-10: 0-13-766048-0
  • ISBN-13: 978-0-13-766048-3

Networking Essentials Companion Guide is the official supplemental textbook for the Networking Essentials course in the Cisco Networking Academy.


Networking is at the heart of the digital transformation. The network is essential to many business functions today, including business-critical data and operations, cybersecurity, and so much more. A wide variety of career paths rely on the network, so it's important to understand what the network can do, how it operates, and how to protect it.

This is a great course for developers, data scientists, cybersecurity specialists, and other professionals looking to broaden their networking domain knowledge. It's also an excellent launching point for students pursuing a wide range of career pathwaysfrom cybersecurity to software development to business and more.

The Companion Guide is designed as a portable desk reference to use anytime, anywhere to reinforce the material from the course and organize your time.

The book's features help you focus on important concepts to succeed in this course:

* Chapter objectives: Review core concepts by answering the focus questions listed at the beginning of each chapter.
* Key terms: Refer to the lists of networking vocabulary introduced and highlighted in context in each chapter.
* Glossary: Consult the comprehensive Glossary with more than 250 terms.
* Summary of Activities and Labs: Maximize your study time with this complete list of all associated practice exercises at the end of each chapter.
* Check Your Understanding: Evaluate your readiness with the end-of-chapter questions that match the style of questions you see in the online course quizzes. The answer key explains each answer.


Sample Content

Sample Pages

Download the sample pages (includes Chapter 5)

Table of Contents

Introduction xxvii
Chapter 1 Communications in a Connected World 1
Objectives 1
Key Terms 1
Introduction (1.0) 2
Network Types (1.1) 3
    Everything Is Online (1.1.1) 3
    Who Owns "The Internet"? (1.1.2) 3
    Local Networks (1.1.3) 3
    Mobile Devices (1.1.5) 7
    Connected Home Devices (1.1.6) 10
    Other Connected Devices (1.1.7) 12
Data Transmission (1.2) 15
    Types of Personal Data (1.2.2) 15
    Common Methods of Data Transmission (1.2.4) 16
Bandwidth and Throughput (1.3) 17
    Bandwidth (1.3.1) 17
    Throughput (1.3.3) 18
Clients and Servers (1.4) 19
    Client and Server Roles (1.4.1) 19
    Peer-to-Peer Networks (1.4.2) 20
    Peer-to-Peer Applications (1.4.3) 21
    Multiple Roles in the Network (1.4.4) 22
Network Components (1.5) 23
    Network Infrastructure (1.5.2) 23
    End Devices (1.5.3) 25
Summary (1.6) 26
Practice 27
Check Your Understanding 27
Chapter 2 Online Communications 31
Objectives 31
Key Terms 31
Introduction (2.0) 32
Wireless Networks (2.1) 32
    Mobile Telephones (2.1.2) 32
    Cell Phone Network (2.1.3) 32
    Other Wireless Networks (2.1.5) 33
Local Network Connections (2.2) 34
    LAN Components (2.2.2) 34
    End Device Addressing (2.2.4) 39
    Manual and Automatic Address Assignment (2.2.6) 40
Network Documentation (2.3) 41
    Device Names and Address Planning (2.3.1) 41
    Network Topologies and Representations (2.3.2) 42
    Logical Network Information (2.3.4) 43
Summary (2.4) 45
Practice 46
Check Your Understanding Questions 46
Chapter 3 Explore Networks with Packet Tracer 49
Objectives 49
Key Terms 49
Introduction (3.0) 50
Packet Tracer Network Simulator (3.1) 50
Packet Tracer Installation (3.2) 50
The Packet Tracer User Interface (3.3) 51
    Locate and Deploy Devices (3.3.2) 52
Packet Tracer Network Configuration (3.4) 53
    GUI and CLI Configuration in Packet Tracer (3.4.2) 54
Summary (3.5) 59
Practice 61
Check Your Understanding Questions 61
Chapter 4 Build a Simple Network 67
Objectives 67
Key Terms 67
Introduction (4.0.1) 68
Network Media Types (4.1) 68
    Three Media Types (4.1.2) 68
    Common Network Cables (4.1.3) 69
Ethernet Cabling (4.2) 71
    Twisted-Pair Cables (4.2.1) 71
    Types of Twisted-Pair Cables (4.2.2) 72
Coaxial and Fiber-Optic Cabling (4.3) 75
    Cable TV and Satellite Cables (4.3.1) 75
    Fiber-Optic Cables (4.3.2) 76
Twisted-Pair Operation (4.4) 78
    Twisted-Pair Wiring Schemes (4.4.1) 78
    Twisted-Pair Transmit and Receive Pairs (4.4.2) 79
Verify Connectivity (4.5) 79
    Using the ping Command (4.5.2) 80
    The traceroute Command (4.5.3) 81
Summary (4.6) 83
Practice 85
Check Your Understanding Questions 85
Chapter 5 Communication Principles 89
Objectives 89
Key Terms 89
Introduction (5.0.1) 90
The Rules (5.1) 90
    The Three Elements (5.1.1) 90
    Communication Protocols (5.1.2) 91
    Why Protocols Matter (5.1.3) 93
Communication Standards (5.2) 95
    The Internet and Standards (5.2.2) 95
    Network Standards Organizations (5.2.3) 95
Network Communication Models (5.3) 96
    The Protocol Stack (5.3.3) 97
    The TCP/IP Model (5.3.4) 98
    The OSI Reference Model (5.3.5) 99
    Upper and Lower Layers of the OSI Model (5.3.6) 100
    OSI Model and TCP/IP Model Comparison (5.3.7) 101
Ethernet (5.4) 103
    The Rise of Ethernet (5.4.1) 103
    Ethernet Evolution (5.4.2) 104
    The Ethernet MAC Address (5.4.4) 105
Summary (5.5) 107
Practice 108
Check Your Understanding Questions 108
Chapter 6 Network Design and the Access Layer 111
Objectives 111
Key Terms 111
Introduction (6.0.1) 112
Encapsulation and the Ethernet Frame (6.1) 112
    Encapsulation (6.1.2) 112
    Ethernet Frame (6.1.3) 114
Hierarchical Network Design (6.2) 115
    Physical and Logical Addresses (6.2.2) 115
    Hierarchical Analogy (6.2.5) 117
    Benefits of a Hierarchical Design (6.2.7) 117
    Access, Distribution, and Core (6.2.8) 119
The Access Layer (6.3) 120
    Access Layer Devices (6.3.1) 121
    Ethernet Hubs (6.3.2) 121
    Ethernet Switches (6.3.4) 123
    The MAC Address Table (6.3.6) 124
Broadcast Containment (6.4) 126
    Ethernet Broadcasts in the Local Network (6.4.2) 126
    Broadcast Domains (6.4.3) 127
    Access Layer Communication (6.4.4) 128
    ARP (6.4.6) 129
Summary (6.5) 131
Practice 133
Check Your Understanding Questions 133
Chapter 7 Routing Between Networks 137
Objectives 137
Key Terms 137
Introduction (7.0.1) 138
The Need for Routing (7.1) 138
    Criteria for Dividing the Local Network (7.1.2) 138
    When Routing Is Needed (7.1.3) 141
The Routing Table (7.2) 142
    Path Selection (7.2.2) 142
    Packet Forwarding (7.2.5) 143
    Routing Table Entries (7.2.7) 145
    The Default Gateway (7.2.8) 146
Create a LAN (7.3) 147
    Local-Area Networks (7.3.1) 147
    Local and Remote Network Segments (7.3.2) 148
Summary (7.4) 152
Practice 153
Check Your Understanding Questions 153
Chapter 8 The Internet Protocol 157
Objectives 157
Key Terms 157
Introduction (8.0.1) 158
Purpose of the IPv4 Address (8.1) 158
    The IPv4 Address (8.1.1) 158
Binary Conversion of an IPv4 Address (8.2) 159
    IPv4 Addressing (8.2.1) 159
    Binary to Decimal (8.2.3) 160
The IPv4 Address Structure (8.3) 162
    Networks and Hosts (8.3.2) 162
    Logical AND (8.3.5) 163
    Calculate Whether the Destination Is Local or Remote (8.3.6) 164
    Calculate the Number of Hosts (8.3.7) 165
Classful IPv4 Addressing (8.4) 166
    Classful and Classless Addressing (8.4.1) 166
Public and Private IPv4 Addresses (8.5) 168
    Private IPv4 Addressing (8.5.1) 168
    Assignment of IPv4 Addresses (8.5.2) 169
Unicast, Broadcast, and Multicast Addresses (8.6) 171
    Unicast Transmission (8.6.2) 171
    Broadcast Transmission (8.6.4) 172
    Multicast Transmission (8.6.6) 173
Summary (8.7) 175
Practice 177
Check Your Understanding Questions 177
Chapter 9 Dynamic Addressing with DHCP 181
Objectives 181
Key Terms 181
Introduction (9.0.1) 182
Static and Dynamic Addressing (9.1) 182
    Static IPv4 Address Assignment (9.1.1) 182
    Dynamic IPv4 Address Assignment (9.1.2) 183
    DHCP Servers (9.1.3) 184
DHCPv4 Configuration (9.2) 185
    DHCPv4 Operation (9.2.2) 185
    DHCP Service Configuration (9.2.4) 186
Summary (9.3) 188
Practice 189
Check Your Understanding Questions 189
Chapter 10 IPv4 and IPv6 Address Management 193
Objectives 193
Key Terms 193
Introduction (10.0.1) 194
Network Boundaries (10.1) 194
    Routers as Gateways (10.1.2) 194
    Routers as Boundaries Between Networks (10.1.3) 195
Network Address Translation (10.2) 196
    NAT Operation (10.2.2) 196
IPv4 Issues (10.3) 198
    Need for IPv6 (10.3.1) 198
    IPv6 Address Size (10.3.2) 200
    IPv4 and IPv6 Coexistence (10.3.4) 201
IPv6 Features (10.4) 203
    IPv6 Autoconfiguration and Link-Local Addresses (10.4.3) 203
    IPv6 Address Representation (10.4.5) 204
Summary (10.5) 206
Practice 207
Check Your Understanding Questions 208
Chapter 11 Transport Layer Services 211
Objectives 211
Key Terms 211
Introduction (11.0.1) 212
The Client/Server Relationship (11.1) 212
    Client and Server Interaction (11.1.1) 212
    Client Requests a Web Page (11.1.3) 213
    URI, URN, and URL (11.1.4) 214
TCP and UDP (11.2) 215
    Protocol Operations (11.2.1) 215
    TCP and UDP (11.2.3) 216
    TCP Reliability (11.2.4) 216
    UDP Best Effort Delivery (11.2.5) 217
Port Numbers (11.3) 218
    TCP and UDP Port Numbers (11.3.2) 218
    Destination and Source Port Numbers (11.3.3) 220
    Socket Pairs (11.3.4) 221
    The netstat Command (11.3.5) 223
Summary (11.4) 224
Practice 225
Check Your Understanding Questions 225
Chapter 12 Application Layer Services 229
Objectives 229
Key Terms 229
Introduction (12.0.1) 230
Network Application Services (12.1) 230
    Common Network Application Services (12.1.1) 230
Domain Name System (12.2) 231
    Domain Name Translation (12.2.1) 231
    DNS Servers (12.2.3) 232
Web Clients and Servers (12.3) 233
    HTTP and HTML (12.3.2) 233
FTP Clients and Servers (12.4) 234
    File Transfer Protocol (12.4.1) 235
    FTP Client Software (12.4.3) 236
Virtual Terminals (12.5) 237
    Telnet (12.5.2) 237
    Security Issues with Telnet (12.5.3) 238
Email and Messaging (12.6) 239
    Email Clients and Servers (12.6.1) 239
    Email Protocols (12.6.2) 240
    Text Messaging (12.6.3) 242
    Internet Phone Calls (12.6.4) 243
Summary (12.7) 244
Practice 246
Check Your Understanding Questions 246
Chapter 13 Build a Home Network 249
Objectives 249
Key Terms 249
Introduction (13.0.1) 250
Home Network Basics (13.1) 250
    Connecting Home Devices (13.1.1) 250
    Components of a Home Network (13.1.2) 251
    Typical Home Network Routers (13.1.3) 252
Network Technologies in the Home (13.2) 253
    The Electromagnetic Spectrum (13.2.1) 253
    LAN Wireless Frequencies (13.2.2) 254
    Wired Network Technologies (13.2.3) 255
Wireless Standards (13.3) 257
    Wi-Fi Networks (13.3.1) 257
    Wireless Settings (13.3.2) 257
Wireless Traffic Controls (13.4) 259
    Wireless Channels (13.4.1) 259
    Wireless as a Shared Media (13.4.2) 260
Set Up a Home Router (13.5) 261
    First Time Setup (13.5.1) 261
    Design Considerations (13.5.2) 261
    MAC Address Filtering (13.5.3) 263
Summary (13.6) 265
Practice 267
Check Your Understanding Questions 267
Chapter 14 Connect to the Internet 271
Objectives 271
Key Terms 271
Introduction (14.0.1) 272
ISP Connectivity Options (14.1) 272
    ISP Services (14.1.1) 272
    ISP Connections (14.1.2) 273
    Cable and DSL Connections (14.1.3) 274
    Additional Connectivity Options (14.1.4) 275
Network Virtualization (14.2) 276
    Cloud Computing (14.2.2) 276
    Types of Clouds (14.2.3) 276
    Cloud Services (14.2.4) 277
    Cloud Computing and Virtualization (14.2.5) 277
    Advantages of Virtualization (14.2.6) 279
    Hypervisors (14.2.7) 279
    Network Virtualization (14.2.9) 281
    Control Plane and Data Plane (14.2.10) 282
    Network Virtualization and SDN (14.2.11) 283
    SDN Architecture (14.2.12) 283
Mobile Device Connectivity (14.3) 284
    Mobile Devices and Wi-Fi (14.3.1) 284
    Wi-Fi Settings (14.3.2) 285
    Configure Mobile Wi-Fi Connectivity (14.3.3) 286
    Configure Cellular Data Settings (14.3.4) 288
    Simple Connectivity with Bluetooth (14.3.6) 290
    Bluetooth Pairing (14.3.7) 290
Summary (14.4) 293
Practice 295
Check Your Understanding Questions 295
Chapter 15 Security Considerations 299
Objectives 299
Key Terms 299
Introduction (15.0.1) 300
Security Threats (15.1) 300
    Types of Threats (15.1.1) 300
    Internal and External Threats (15.1.2) 301
Social Engineering Attacks (15.2) 302
    Overview of Social Engineering (15.2.1) 302
    Types of Social Engineering Attacks (15.2.2) 303
Malware (15.3) 304
    Malicious Software (15.3.1) 305
    Types of Malware (15.3.2) 305
    Spyware (15.3.3) 306
    Adware and Popups (15.3.4) 306
    Botnets and Zombies (15.3.5) 307
Denial-of-Service Attacks (15.4) 308
    Denial of Service (15.4.1) 308
    Distributed Denial of Service (15.4.2) 309
    Brute Force (15.4.3) 310
Security Tools (15.5) 310
    Security Practices and Procedures (15.5.1) 310
    Security Tools and Applications (15.5.2) 312
    Patches and Updates (15.5.3) 313
Antimalware Software (15.6) 314
    Signs of Infections (15.6.1) 314
    Antivirus Software (15.6.2) 315
    Antispam Software (15.6.3) 316
    Antispyware Software (15.6.4) 316
    Additional Safeguards (15.6.5) 317
Summary (15.7) 318
Practice 321
Check Your Understanding Questions 321
Chapter 16 Configure Network and Device Security 325
Objectives 325
Key Terms 325
Introduction (16.0.1) 326
Wireless Security Measures (16.1) 326
    Wireless Vulnerabilities (16.1.1) 326
    A Comprehensive Security Plan (16.1.2) 327
    SSID Broadcasts (16.1.4) 333
    Changing Default Settings (16.1.5) 334
    MAC Address Filtering (16.1.6) 335
Implement Wireless Security (16.2) 336
    Open Authentication (16.2.1) 336
    Authentication and Association (16.2.2) 336
    Authentication Protocols (16.2.3) 337
Configure a Firewall (16.3) 338
    Firewall Overview (16.3.1) 338
    Firewall Operation (16.3.2) 338
    The DMZ (16.3.3) 339
    Port Forwarding (16.3.4) 340
    Port Triggering (16.3.5) 341
Summary (16.4) 344
Practice 345
Check Your Understanding Questions 346
Chapter 17 Cisco Switches and Routers 349
Objectives 349
Key Terms 349
Introduction (17.0.1) 350
Cisco Switches (17.1) 350
    Connect More Devices (17.1.1) 350
    Cisco LAN Switches (17.1.2) 351
    LAN Switch Components (17.1.5) 354
Switch Boot Process (17.2) 355
    Power Up the Switch (17.2.1) 355
    In-Band and Out-of-Band Management (17.2.3) 358
    IOS Startup Files (17.2.4) 358
Cisco Routers (17.3) 359
    Router Components (17.3.2) 360
    Router Interface Ports (17.3.3) 360
Router Boot Process (17.4) 361
    Power Up the Router (17.4.1) 361
    Management Ports (17.4.2) 365
Summary (17.5) 367
Practice 368
Check Your Understanding Questions 368
Chapter 18 The Cisco IOS Command Line 373
Objectives 373
Key Terms 373
Introduction (18.0.1) 374
Navigate the IOS (18.1) 374
    The Cisco IOS Command-Line Interface (18.1.1) 374
    Primary Command Modes (18.1.2) 375
    A Note About Syntax Checker Activities (18.1.5) 376
The Command Structure (18.2) 376
    Basic IOS Command Structure (18.2.1) 376
    IOS Command Syntax (18.2.2) 377
    Hotkeys and Shortcuts (18.2.4) 378
View Device Information (18.3) 380
    Show Commands (18.3.2) 381
Summary (18.4) 387
Practice 388
Check Your Understanding Questions 388
Chapter 19 Build a Small Cisco Network 391
Objectives 391
Key Terms 391
Introduction (19.0.1) 392
Basic Switch Configuration (19.1) 392
    Basic Switch Configuration Steps (19.1.1) 392
    Switch Virtual Interface Configuration (19.1.2) 394
Configure Initial Router Settings (19.2) 395
    Basic Router Configuration Steps (19.2.1) 395
    Basic Router Configuration Example (19.2.2) 396
Secure the Devices (19.3) 398
    Password Recommendations (19.3.1) 398
    Secure Remote Access (19.3.2) 399
    Configure SSH (19.3.3) 400
    Verify SSH (19.3.5) 402
Connecting the Switch to the Router (19.4) 404
    Default Gateway for a Host (19.4.1) 404
    Default Gateway on a Switch (19.4.2) 406
Summary (19.5) 409
Practice 411
Check Your Understanding Questions 412
Chapter 20 Troubleshoot Common Network Problems 415
Objectives 415
Key Terms 415
Introduction (20.0.1) 416
The Troubleshooting Process (20.1) 416
    Network Troubleshooting Overview (20.1.1) 416
    Gather Information (20.1.2) 416
    Structured Troubleshooting Methods (20.1.3) 418
    Guidelines for Selecting a Troubleshooting Method (20.1.4) 422
Physical Layer Problems (20.2) 423
    Common Layer 1 Problems (20.2.1) 423
    Wireless Router LEDs (20.2.2) 424
    Cabling Problems (20.2.3) 426
Troubleshooting Commands (20.3) 426
    Overview of Troubleshooting Commands (20.3.1) 426
    The ipconfig Command (20.3.2) 427
    The ping Command (20.3.4) 430
    Ping Results (20.3.5) 431
    Divide and Conquer with ping (20.3.7) 432
    The tracert Command (20.3.8) 433
    The netstat Command (20.3.9) 434
    The nslookup Command (20.3.10) 436
Troubleshoot Wireless Issues (20.4) 438
    Causes of Wireless Issues (20.4.1) 438
    Authentication and Association Errors (20.4.2) 439
Common Internet Connectivity Issues (20.5) 441
    DHCP Server Configuration Errors (20.5.1) 441
    Check Internet Configuration (20.5.2) 442
    Check Firewall Settings (20.5.3) 444
Customer Support (20.6) 444
    Sources of Help (20.6.1) 445
    When to Call for Help (20.6.2) 445
    Support Desk Interaction (20.6.3) 446
    Issue Resolution (20.6.4) 447
    Support Desk Tickets and Work Orders (20.6.5) 448
Summary (20.7) 450
Practice 453
Check Your Understanding Questions 454
Appendix A Answers to the "Check Your Understanding" Questions 459
Glossary 471


9780137660483    TOC    1/25/2022


Updates

Submit Errata

More Information

Pearson IT Certification Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Pearson IT Certification and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about Pearson IT Certification products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites; develop new products and services; conduct educational research; and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by Adobe Press. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.pearsonitcertification.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020