Home > Store

CCNA Security 210-260 Pearson uCertify Course and Textbook Bundle

Register your product to gain access to bonus material or receive a coupon.

CCNA Security 210-260 Pearson uCertify Course and Textbook Bundle

Book

  • Sorry, this book is no longer in print.
Not for Sale

About

Features

Student Feature Highlights

  • Device Ready!  Access courses online from any computer (PC or Mac), tablet or mobile device (Android,iOS)
  • Course dashboard provides ease of use
  • Interactive eLearning elements throughout the course
  • Exercises, flash cards and quizzes
  • Video Tutorials
  • Track progress via a personal study planner

Instructor Feature Highlights

  • Super roster for course and student management
  • Master course and instantaneous cloning for multiple sections
  • Powerful analytics to track student engagement and progress
  • Customizable assignment dates and skill mastery levels
  • Pre and Post assessments for benchmarking
  • Maps to certification exam domains (when applicable)
  • Grade book export feature
  • LTI compliant for integration


  • Book covers the official exam preparation text for the CCNA Security certification
  • Includes exam-realistic questions on CD
  • Includes tools to help readers remember the most important details for the exam

Description

  • Copyright 2016
  • Edition: 1st
  • Book
  • ISBN-10: 1-58720-608-0
  • ISBN-13: 978-1-58720-608-5

Web-based learning and exam preparation 

Welcome to the CCNA Security 210-260 Pearson uCertify Course and Textbook Bundle

The CCNA Security 210-260 Pearson uCertify Course is an easy-to-use online course that allows you to assess your readiness and teaches you what you need to know to pass the CCNA Security 210-260 exam.

Master all of the CCNA Security 210-260 exam objectives in the framework of CCNA Security 210-260 Official Cert Guide interactive eBook. The interactive eBook includes informative text, tables, step-by-step lists, images, video. interactive exercises, glossary flash cards, and review activities.

Gauge your readiness with a pre-assessment exam with questions specifically designed to identify your deficiencies. Then after you have worked through the course material practice with two complete exam simulations to see if you are ready or where you need to study more. Finally there is a post assessment to get you ready for exam day. In total there are over 290 practice exam questions.

All of the content—the complete textbook, the practice questions, the exercises, and the activities—is focused around the official CCNA Security 210-260 exam objectives. 



CCNA Security 210-260 Official Cert Guide is a best-of-breed Cisco exam study guide that focuses specifically on the objectives for the CCNA Security Implementing Cisco Network Security (IINS) 210-260 exam. Cisco Security experts Omar Santos and John Stuppi share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics.


CCNA Security 210-260 Official Cert Guide presents you with an organized test-preparation routine through the use of proven series elements and techniques. “Do I Know This Already?” quizzes open each chapter and enable you to decide how much time you need to spend on each section. A list of official exam topics makes referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly.


The companion CD-ROM contains the powerful Pearson IT Certification Practice Test engine that enables you to focus on individual topic areas or take complete, timed exams. The assessment engine also tracks your performance and provides feedback on a chapter-by-chapter basis, laying out a complete assessment of your knowledge to help you focus your study where it is needed most. The CD also contains 90 minutes of video training on CCP, NAT, object groups, ACLs, port security on a Layer 2 switch, CP3L, and zone-based firewalls.


Well regarded for its level of detail, assessment features, and challenging review questions and exercises, this official study guide helps you master the concepts and techniques that will enable you to succeed on the exam the first time.


CCNA Security 210-260 Official Cert Guide is part of a recommended learning path from Cisco that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit http://www.cisco.com/web/learning/index.html.


The official study guide helps you master all the topics on the CCNA Security Implementing Cisco Network Security (IINS) 210-260 exam, including

·         Security concepts and threats

·         Implementing AAA using IOS and ISE

·         Bring Your Own Device (BYOD)

·         VPN technology and cryptography

·         IP security

·         Implementing IPsec site-to-site VPNs

·         Implementing SSL remote-access VPNs using Cisco ASA

·         Securing Layer 2 technologies

·         Network Foundation Protection (NFP)

·         Securing the management, data, and control planes

·         Understand, implement, and configure Cisco firewall technologies

·         Cisco IPS fundamentals

·         Mitigation technologies for e-mail, web-based, and endpoint threats

The CD-ROM contains two free, complete practice exams and 90 minutes of video training.

Includes Exclusive Offer for 70% Off Premium Edition eBook and Practice Test


Pearson IT Certification Practice Test minimum system requirements:

Windows XP (SP3), Windows Vista (SP2), Windows 7, or Windows 8; Microsoft .NET Framework 4.0 Client; Pentium class 1GHz processor (or equivalent); 512MB RAM; 650MB disk space plus 50MB for each downloaded practice exam; access to the Internet to register and download the exam databases


Category: Cisco Press–Cisco Certification

Covers: CCNA Security 210-260

Sample Content

Table of Contents

Introduction xxvi

Part I Fundamentals of Network Security

Chapter 1 Networking Security Concepts 3

“Do I Know This Already?” Quiz 3

Foundation Topics 6

Understanding Network and Information Security Basics 6

    Network Security Objectives 6

    Confidentiality, Integrity, and Availability 6

    Cost-Benefit Analysis of Security 7

    Classifying Assets 8

    Classifying Vulnerabilities 10

    Classifying Countermeasures 10

    What Do We Do with the Risk? 11

Recognizing Current Network Threats 12

    Potential Attackers 12

    Attack Methods 13

    Attack Vectors 14

    Man-in-the-Middle Attacks 14

    Other Miscellaneous Attack Methods 15

Applying Fundamental Security Principles to Network Design 16

    Guidelines 16

    Network Topologies 17

    Network Security for a Virtual Environment 20

    How It All Fits Together 22

Exam Preparation Tasks 23

Review All the Key Topics 23

Complete the Tables and Lists from Memory 23

Define Key Terms 23

Chapter 2 Common Security Threats 25

“Do I Know This Already?” Quiz 25

Foundation Topics 27

Network Security Threat Landscape 27

Distributed Denial-of-Service Attacks 27

Social Engineering Methods 28

    Social Engineering Tactics 29

    Defenses Against Social Engineering 29

Malware Identification Tools 30

    Methods Available for Malware Identification 30

    Data Loss and Exfiltration Methods 31

Summary 32

Exam Preparation Tasks 33

Review All the Key Topics 33

Complete the Tables and Lists from Memory 33

Define Key Terms 33

Part II Secure Access

Chapter 3 Implementing AAA in Cisco IOS 35

“Do I Know This Already?” Quiz 35

Foundation Topics 38

Cisco Secure ACS, RADIUS, and TACACS 38

    Why Use Cisco ACS? 38

    On What Platform Does ACS Run? 38

    What Is ISE? 39

    Protocols Used Between the ACS and the Router 39

    Protocol Choices Between the ACS Server and the Client (the Router) 40

Configuring Routers to Interoperate with an ACS Server 41

Configuring the ACS Server to Interoperate with a Router 51

Verifying and Troubleshooting Router-to-ACS Server Interactions 60

Exam Preparation Tasks 67

Review All the Key Topics 67

Complete the Tables and Lists from Memory 67

Define Key Terms 67

Command Reference to Check Your Memory 67

Chapter 4 Bring Your Own Device (BYOD) 71

“Do I Know This Already?” Quiz 71

Foundation Topics 73

Bring Your Own Device Fundamentals 73

BYOD Architecture Framework 74

    BYOD Solution Components 74

Mobile Device Management 76

    MDM Deployment Options 76

        On-Premise MDM Deployment 77

        Cloud-Based MDM Deployment 78

Exam Preparation Tasks 80

Review All the Key Topics 80

Complete the Tables and Lists from Memory 80

Define Key Terms 80

Part III Virtual Private Networks (VPN)

Chapter 5 Fundamentals of VPN Technology and Cryptography 83

“Do I Know This Already?” Quiz 83

Foundation Topics 87

Understanding VPNs and Why We Use Them 87

    What Is a VPN? 87

    Types of VPNs 88

        Two Main Types of VPNs 88

    Main Benefits of VPNs 89

        Confidentiality 89

        Data Integrity 90

        Authentication 90

        Antireplay Protection 90

Cryptography Basic Components 91

    Ciphers and Keys 91

        Ciphers 91

        Keys 92

    Block and Stream Ciphers 92

        Block Ciphers 92

        Stream Ciphers 92

    Symmetric and Asymmetric Algorithms 92

        Symmetric 93

        Asymmetric 93

    Hashes 94

    Hashed Message Authentication Code 95

    Digital Signatures 95

        Digital Signatures in Action 95

    Key Management 96

        Next-Generation Encryption Protocols 97

    IPsec and SSL 97

        IPsec 97

        SSL 98

Public Key Infrastructure 99

    Public and Private Key Pairs 99

    RSA Algorithm, the Keys, and Digital Certificates 99

        Who Has Keys and a Digital Certificate? 100

        How Two Parties Exchange Public Keys 100

        Creating a Digital Signature 100

    Certificate Authorities 100

    Root and Identity Certificates 101

        Root Certificate 101

        Identity Certificate 102

        Using the Digital Certificates to Get the Peer’s Public Key 103

        X.500 and X.509v3 Certificates 103

    Authenticating and Enrolling with the CA 104

    Public Key Cryptography Standards 105

    Simple Certificate Enrollment Protocol 105

    Revoked Certificates 105

    Uses for Digital Certificates 106

    PKI Topologies 106

        Single Root CA 107

        Hierarchical CA with Subordinate CAs 107

        Cross-Certifying CAs 107

Putting the Pieces of PKI to Work 107

    ASA’s Default Certificate 108

    Viewing the Certificates in ASDM 108

    Adding a New Root Certificate 109

    Easier Method for Installing Both Root and Identity Certificates 111

Exam Preparation Tasks 116

Review All the Key Topics 116

Complete the Tables and Lists from Memory 117

Define Key Terms 117

Command Reference to Check Your Memory 117

Chapter 6 Fundamentals of IP Security 119

“Do I Know This Already?” Quiz 119

Foundation Topics 122

IPsec Concepts, Components, and Operations 122

    The Goal of IPsec 122

    The Internet Key Exchange (IKE) Protocol 123

    The Play by Play for IPsec 124

        Step 1: Negotiate the IKEv1 Phase 1 Tunnel 124

        Step 2: Run the DH Key Exchange 125

        Step 3: Authenticate the Peer 126

        What About the User’s Original Packet? 126

        Leveraging What They Have Already Built 126

        Now IPsec Can Protect the User’s Packets 127

        Traffic Before IPsec 127

        Traffic After IPsec 127

    Summary of the IPsec Story 128

Configuring and Verifying IPsec 129

    Tools to Configure the Tunnels 129

    Start with a Plan 129

    Applying the Configuration 129

    Viewing the CLI Equivalent at the Router 137

    Completing and Verifying IPsec 139

Exam Preparation Tasks 146

Review All the Key Topics 146

Complete the Tables and Lists from Memory 146

Define Key Terms 146

Command Reference to Check Your Memory 147

Chapter 7 Implementing IPsec Site-to-Site VPNs 149

“Do I Know This Already?” Quiz 149

Foundation Topics 152

Planning and Preparing an IPsec Site-to-Site VPN 152

    Customer Needs 152

    Planning IKEv1 Phase 1 154

    Planning IKEv1 Phase 2 154

Implementing and Verifying an IPsec Site-to-Site VPN in Cisco IOS Devices 155

    Troubleshooting IPsec Site-to-Site VPNs in Cisco IOS 164

Implementing and Verifying an IPsec Site-to-Site VPN in Cisco ASA 179

    Troubleshooting IPsec Site-to-Site VPNs in Cisco ASA 193

Exam Preparation Tasks 199

Review All the Key Topics 199

Complete the Tables and Lists from Memory 199

Define Key Terms 199

Command Reference to Check Your Memory 199

Chapter 8 Implementing SSL VPNs Using Cisco ASA 203

“Do I Know This Already?” Quiz 203

Foundation Topics 206

Functions and Use of SSL for VPNs 206

    Is IPsec Out of the Picture? 206

    SSL and TLS Protocol Framework 207

    The Play by Play of SSL for VPNs 207

    SSL VPN Flavors 208

Configuring Clientless SSL VPNs on ASA 209

    Using the SSL VPN Wizard 209

    Digital Certificates 211

    Accessing the Connection Profile 211

    Authenticating Users 211

    Logging In 215

    Seeing the VPN Activity from the Server 217

Using the Cisco AnyConnect Secure Mobility Client 217

    Types of SSL VPNs 218

    Configuring the Cisco ASA to Terminate the Cisco AnyConnect Secure Mobility Client Connections 218

    Groups, Connection Profiles, and Defaults 225

    One Item with Three Different Names 226

    Split Tunneling 227

Troubleshooting SSL VPN 228

    Troubleshooting SSL Negotiations 228

    Troubleshooting AnyConnect Client Issues 228

        Initial Connectivity Issues 228

        Traffic-Specific Issues 230

Exam Preparation Tasks 231

Review All the Key Topics 231

Complete the Tables and Lists from Memory 231

Define Key Terms 231

Part IV Secure Routing and Switching

Chapter 9 Securing Layer 2 Technologies 233

“Do I Know This Already?” Quiz 233

Foundation Topics 236

VLAN and Trunking Fundamentals 236

    What Is a VLAN? 236

    Trunking with 802.1Q 238

    Following the Frame, Step by Step 239

    The Native VLAN on a Trunk 239

    So, What Do You Want to Be? (Asks the Port) 239

    Inter-VLAN Routing 240

    The Challenge of Using Physical Interfaces Only 240

    Using Virtual “Sub” Interfaces 240

Spanning-Tree Fundamentals 241

    Loops in Networks Are Usually Bad 241

    The Life of a Loop 241

    The Solution to the Layer 2 Loop 242

    STP Is Wary of New Ports 245

    Improving the Time Until Forwarding 245

Common Layer 2 Threats and How to Mitigate Them 246

    Disrupt the Bottom of the Wall, and the Top Is Disrupted, Too 246

    Layer 2 Best Practices 246

    Do Not Allow Negotiations 247

    Layer 2 Security Toolkit 248

    Specific Layer 2 Mitigation for CCNA Security 248

        BPDU Guard 248

        Root Guard 249

        Port Security 250

CDP and LLDP 251

DHCP Snooping 253

Dynamic ARP Inspection 254

Exam Preparation Tasks 257

Review All the Key Topics 257

Complete the Tables and Lists from Memory 258

Review the Port Security Video Included with This Book 258

Define Key Terms 258

Command Reference to Check Your Memory 258

Chapter 10 Network Foundation Protection 261

“Do I Know This Already?” Quiz 261

Foundation Topics 264

Using Network Foundation Protection to Secure Networks 264

    The Importance of the Network Infrastructure 264

    The Network Foundation Protection Framework 264

    Interdependence 265

    Implementing NFP 265

Understanding the Management Plane 266

    First Things First 266

    Best Practices for Securing the Management Plane 267

Understanding the Control Plane 268

    Best Practices for Securing the Control Plane 268

Understanding the Data Plane 270

    Best Practices for Protecting the Data Plane 271

    Additional Data Plane Protection Mechanisms 271

Exam Preparation Tasks 272

Review All the Key Topics 272

Complete the Tables and Lists from Memory 272

Define Key Terms 272

Chapter 11 Securing the Management Plane on Cisco IOS Devices 275

“Do I Know This Already?” Quiz 275

Foundation Topics 278

Securing Management Traffic 278

    What Is Management Traffic and the Management Plane? 278

    Beyond the Blue Rollover Cable 278

    Management Plane Best Practices 278

    Password Recommendations 281

    Using AAA to Verify Users 281

        AAA Components 282

        Options for Storing Usernames, Passwords, and Access Rules 282

        Authorizing VPN Users 283

        Router Access Authentication 284

        The AAA Method List 285

    Role-Based Access Control 286

        Custom Privilege Levels 287

        Limiting the Administrator by Assigning a View 287

    Encrypted Management Protocols 287

    Using Logging Files 288

    Understanding NTP 289

    Protecting Cisco IOS Files 289

Implementing Security Measures to Protect the Management Plane 290

    Implementing Strong Passwords 290

    User Authentication with AAA 292

    Using the CLI to Troubleshoot AAA for Cisco Routers 296

    RBAC Privilege Level/Parser View 301

    Implementing Parser Views 303

    SSH and HTTPS 305

    Implementing Logging Features 308

        Configuring Syslog Support 308

    SNMP Features 310

    Configuring NTP 313

    Secure Copy Protocol 315

    Securing the Cisco IOS Image and Configuration Files 315

Exam Preparation Tasks 317

Review All the Key Topics 317

Complete the Tables and Lists from Memory 318

Define Key Terms 318

Command Reference to Check Your Memory 318

Chapter 12 Securing the Data Plane in IPv6 321

“Do I Know This Already?” Quiz 321

Foundation Topics 324

Understanding and Configuring IPv6 324

    Why IPv6? 324

    The Format of an IPv6 Address 325

        Understanding the Shortcuts 327

        Did We Get an Extra Address? 327

        IPv6 Address Types 327

Configuring IPv6 Routing 330

    Moving to IPv6 331

Developing a Security Plan for IPv6 332

    Best Practices Common to Both IPv4 and IPv6 332

    Threats Common to Both IPv4 and IPv6 333

    The Focus on IPv6 Security 334

    New Potential Risks with IPv6 334

    IPv6 Best Practices 336

    IPv6 Access Control Lists 337

Exam Preparation Tasks 338

Review All the Key Topics 338

Complete the Tables and Lists from Memory 338

Define Key Terms 338

Command Reference to Check Your Memory 338

Chapter 13 Securing Routing Protocols and the Control Plane 341

“Do I Know This Already?” Quiz 341

Foundation Topics 344

Securing the Control Plane 344

    Minimizing the Impact of Control Plane Traffic on the CPU 344

Control Plane Policing 346

    Control Plane Protection 348

Securing Routing Protocols 348

    Implement Routing Update Authentication on OSPF 348

    Implement Routing Update Authentication on EIGRP 349

    Implement Routing Update Authentication on RIP 350

    Implement Routing Update Authentication on BGP 351

Exam Preparation Tasks 353

Review All the Key Topics 353

Complete the Tables and Lists from Memory 353

Define Key Terms 353

Part V Cisco Firewall Technologies and Intrusion Prevention System Technologies

Chapter 14 Understanding Firewall Fundamentals 355

“Do I Know This Already?” Quiz 355

Foundation Topics 358

Firewall Concepts and Technologies 358

    Firewall Technologies 358

    Objectives of a Good Firewall 358

    Firewall Justifications 359

    The Defense-in-Depth Approach 360

    Firewall Methodologies 361

        Static Packet Filtering 362

        Application Layer Gateway 363

        Stateful Packet Filtering 363

        Application Inspection 364

        Transparent Firewalls 365

        Next-Generation Firewalls 365

Using Network Address Translation 366

    NAT Is About Hiding or Changing the Truth About Source Addresses 366

    Inside, Outside, Local, Global 367

    Port Address Translation 368

    NAT Options 369

Creating and Deploying Firewalls 370

    Firewall Technologies 370

    Firewall Design Considerations 370

    Firewall Access Rules 371

    Packet-Filtering Access Rule Structure 372

    Firewall Rule Design Guidelines 372

    Rule Implementation Consistency 373

Exam Preparation Tasks 375

Review All the Key Topics 375

Complete the Tables and Lists from Memory 375

Define Key Terms 375

Chapter 15 Implementing Cisco IOS Zone-Based Firewalls 377

“Do I Know This Already?” Quiz 377

Foundation Topics 379

Cisco IOS Zone-Based Firewalls 379

    How Zone-Based Firewall Operates 379

    Specific Features of Zone-Based Firewalls 379

    Zones and Why We Need Pairs of Them 380

    Putting the Pieces Together 381

    Service Policies 382

    The Self Zone 384

Configuring and Verifying Cisco IOS Zone-Based Firewalls 385

    First Things First 385

    Using CCP to Configure the Firewall 386

    Verifying the Firewall 399

    Verifying the Configuration from the Command Line 400

    Implementing NAT in Addition to ZBF 404

    Verifying Whether NAT Is Working 407

Exam Preparation Tasks 409

Review All the Key Topics 409

Complete the Tables and Lists from Memory 409

Define Key Terms 409

Command Reference to Check Your Memory 409

Chapter 16 Configuring Basic Firewall Policies on Cisco ASA 413

“Do I Know This Already?” Quiz 413

Foundation Topics 416

The ASA Appliance Family and Features 416

    Meet the ASA Family 416

    ASA Features and Services 417

ASA Firewall Fundamentals 419

    ASA Security Levels 419

    The Default Flow of Traffic 420

    Tools to Manage the ASA 422

    Initial Access 422

    Packet Filtering on the ASA 422

    Implementing a Packet-Filtering ACL 423

    Modular Policy Framework 424

    Where to Apply a Policy 425

Configuring the ASA 425

    Beginning the Configuration 425

    Getting to the ASDM GUI 433

    Configuring the Interfaces 435

    IP Addresses for Clients 443

    Basic Routing to the Internet 444

    NAT and PAT 445

    Permitting Additional Access Through the Firewall 447

    Using Packet Tracer to Verify Which Packets Are Allowed 449

    Verifying the Policy of No Telnet 453

Exam Preparation Tasks 454

Review All the Key Topics 454

Complete the Tables and Lists from Memory 454

Define Key Terms 454

Command Reference to Check Your Memory 455

Chapter 17 Cisco IDS/IPS Fundamentals 457

“Do I Know This Already?” Quiz 457

Foundation Topics 460

IPS Versus IDS 460

    What Sensors Do 460

    Difference Between IPS and IDS 460

    Sensor Platforms 462

    True/False Negatives/Positives 463

    Positive/Negative Terminology 463

Identifying Malicious Traffic on the Network 463

    Signature-Based IPS/IDS 464

    Policy-Based IPS/IDS 464

    Anomaly-Based IPS/IDS 464

    Reputation-Based IPS/IDS 464

    When Sensors Detect Malicious Traffic 465

    Controlling Which Actions the Sensors Should Take 467

    Implementing Actions Based on the Risk Rating 468

    Circumventing an IPS/IDS 468

Managing Signatures 469

    Signature or Severity Levels 470

Monitoring and Managing Alarms and Alerts 471

    Security Intelligence 471

    IPS/IDS Best Practices 472

Cisco Next-Generation IPS Solutions 472

Exam Preparation Tasks 474

Review All the Key Topics 474

Complete the Tables and Lists from Memory 474

Define Key Terms 474

Part VI Content and Endpoint Security

Chapter 18 Mitigation Technologies for E-mail-Based and Web-Based Threats 477

“Do I Know This Already?” Quiz 477

Foundation Topics 479

Mitigation Technology for E-mail-Based Threats 479

    E-mail-Based Threats 479

    Cisco Cloud E-mail Security 479

    Cisco Hybrid E-mail Security 480

    Cisco E-mail Security Appliance 480

    Cisco ESA Initial Configuration 483

Mitigation Technology for Web-Based Threats 486

    Cisco CWS 486

    Cisco WSA 487

Cisco Content Security Management Appliance 491

Exam Preparation Tasks 493

Review All the Key Topics 493

Complete the Tables and Lists from Memory 493

Define Key Terms 493

Command Reference to Check Your Memory 493

Chapter 19 Mitigation Technologies for Endpoint Threats 495

“Do I Know This Already?” Quiz 495

Foundation Topics 497

Antivirus and Antimalware Solutions 497

Personal Firewalls and Host Intrusion Prevention Systems 498

Advanced Malware Protection for Endpoints 499

Hardware and Software Encryption of Endpoint Data 500

    E-mail Encryption 500

    Encrypting Endpoint Data at Rest 501

    Virtual Private Networks 501

Exam Preparation Tasks 503

Review All the Key Topics 503

Complete the Tables and Lists from Memory 503

Define Key Terms 503

Part VII Final Preparation

Chapter 20 Final Preparation 505

Tools for Final Preparation 505

Exam Engine and Questions on the CD 505

    Install the Exam Engine 505

    Activate and Download the Practice Exam 506

    Activating Other Exams 506

    Premium Edition 506

The Cisco Learning Network 507

Memory Tables 507

Chapter-Ending Review Tools 507

Study Plan 507

Recall the Facts 507

Practice Configurations 508

Using the Exam Engine 508

Part VIII Appendixes

Appendix A Answers to the “Do I Know This Already?” Quizzes 511

Appendix B CCNA Security 210-260 (IINS) Exam Updates 517

Glossary 521

On the CD

Glossary

Appendix C Memory Tables

Appendix D Memory Tables Answer Key

Appendix E Study Planner

9781587205668   TOC   8/14/2015

Updates

Submit Errata

More Information

Pearson IT Certification Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Pearson IT Certification and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about Pearson IT Certification products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites; develop new products and services; conduct educational research; and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by Adobe Press. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.pearsonitcertification.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020