Home > Store

Designing for Cisco Internetwork Solutions (DESGN) Foundation Learning Guide: (CCDA DESGN 640-864), 3rd Edition

Register your product to gain access to bonus material or receive a coupon.

Designing for Cisco Internetwork Solutions (DESGN) Foundation Learning Guide: (CCDA DESGN 640-864), 3rd Edition

Book

  • Sorry, this book is no longer in print.
Not for Sale

eBook (Watermarked)

  • Your Price: $44.79
  • List Price: $55.99
  • Includes EPUB and PDF
  • About eBook Formats
  • This eBook includes the following formats, accessible from your Account page after purchase:

    ePub EPUB The open industry format known for its reflowable content and usability on supported mobile devices.

    Adobe Reader PDF The popular standard, used most often with the free Acrobat® Reader® software.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

Description

  • Copyright 2011
  • Edition: 3rd
  • Book
  • ISBN-10: 1-58720-424-X
  • ISBN-13: 978-1-58720-424-1

Designing for Cisco Internetwork Solutions (DESGN)

Foundation Learning Guide

Third Edition

Sean Wilkins

Foundation learning for the CCDA DESGN 640-864 exam

Designing for Cisco Internetwork Solutions (DESGN) Foundation Learning Guide, Third Edition, is a Cisco®-authorized, self-paced learning tool for CCDA® foundation learning. This book provides you with the knowledge needed to design enterprise networks. By reading this book, you will gain a thorough understanding of designing routed and switched network infrastructures and services involving LAN, WAN, and broadband access for businesses and organizations.

Designing for Cisco Internetwork Solutions (DESGN) Foundation Learning Guide, Third Edition teaches you how to gather internetworking requirements, identify solutions, and design the network infrastructure and services to ensure basic functionality using the principles of hierarchical network design to structure and modularize a converged enterprise network design. Specific topics include understanding the design methodology; structuring and modularizing the network design; designing the Enterprise Campus, Enterprise Data Center, Enterprise Edge, and remote modules as needed; designing an addressing plan and selecting suitable routing protocols; designing basic voice transport across the network; designing a basic wireless solution; and evaluating security solutions. Chapter-ending review questions illustrate and help solidify the concepts presented in the book.

Whether you are preparing for CCDA certification or simply want to gain a better understanding of network design principles, you will benefit from the foundation information presented in this book.

Designing for Cisco Internetwork Solutions (DESGN) Foundation Learning Guide, Third Edition, is part of a recommended learning path from Cisco that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining.

·         Understand network design methodologies and the lifecycle of a network

·         Learn how to structure and modularize network designs within the Cisco Network Architectures for the Enterprise

·         Design basic campus and data center networks

·         Build designs for remote connectivity with WAN technologies

·         Examine IPv4 and IPv6 addressing schemes

·         Select the appropriate routing protocols for various modules in the enterprise architecture

·         Evaluate security solutions for the network

·         Identify voice and video networking considerations

·         Understand design technologies and considerations when implementing a controller-based wireless network

This book is in the Foundation Learning Guide Series. These guides are developed together with Cisco® as the only authorized, self-paced learning tools that help networking professionals build their understanding of networking concepts and prepare for Cisco certification exams.

Sample Content

Online Sample Chapter

CCDA DESGN 640-864: Designing Remote Connectivity

Table of Contents

Introduction xxiii

Chapter 1 Network Fundamentals Review 1

Introduction to Networks 2

Protocols and the OSI Model 2

    OSI Model 3

    Protocols 3

    OSI Layers 4

        Physical Layer: Layer 1 4

        Data Link Layer: Layer 2 4

        Network Layer: Layer 3 5

        Transport Layer: Layer 4 5

        Upper Layers: Layers 5 Through 7 6

    Communication Among OSI Layers 6

LANs and WANs 8

Network Devices 10

    Terminology: Domains, Bandwidth, Unicast, Broadcast, and Multicast 10

    Hubs 11

        Physical Interfaces and Ports 11

    Switches 11

        Switches Versus Bridges 12

    Routers 12

Introduction to the TCP/IP Suite 13

    TCP/IP Transport Layer Protocols 15

        Port Numbers 17

        TCP Sequencing, Acknowledgment, and Windowing 18

    TCP/IP Internet Layer Protocols 22

        Protocols 22

        IPv4 Datagrams 22

        IPv6 Datagrams 24

Routing 25

    Routers Work at the Lower Three OSI Layers 26

    Routing Tables 27

    Routing Protocols 28

Addressing 29

    Physical Addresses 29

    Logical Addresses 30

    Routing and Network Layer Addresses 31

    IPv4 Addresses 31

        IPv4 Address Classes 31

        Private and Public IPv4 Addresses 32

        IPv4 Subnets 33

    IPv6 Addresses 34

        IPv6 Address Types 36

Switching Types 36

    Layer 2 Switching 37

    Layer 3 Switching 39

Spanning Tree Protocol 40

    Redundancy in Layer 2 Switched Networks 40

    STP Terminology and Operation 41

        STP Terminology 41

        STP States 43

        Rapid STP 44

Virtual LANs 45

    VLAN Membership 45

    Trunks 46

    STP and VLANs 46

    Inter-VLAN Routing 47

    Comprehensive Example 49

Summary 52

Review Questions 52

Chapter 2 Network Design Methodology 53

Understanding the Network Architectures for the Enterprise 53

    Business Drivers for a New Network Framework 54

        Business Forces 54

        Technology-Related Forces 54

        IT Challenges 55

    Cisco Network Architectures for the Enterprise 55

        Borderless Networks Architecture 56

        Borderless Networks Architecture Approach 57

        Collaboration Architecture Approach 58

        Data Center/Virtualization Architecture Approach 59

Identifying Design Requirements 61

    Using the PPDIOO Approach for Networks 61

    Benefits of the Lifecycle Approach 63

    Design Methodology 64

Identifying Customer Design Requirements 65

    Identifying Network Applications and Network Services 65

    Defining Organizational Goals 67

    Identifying Organizational Constraints 69

    Identifying Technical Goals 71

    Assessing Technical Constraints 73

Characterizing the Existing Network and Sites 74

    Identifying Major Features of the Network 74

        Sample Site Contact Information 75

        Sample High-Level Network Diagram 76

    Auditing the Existing Network 77

    Using Tools for Auditing the Network 79

    RSPAN with VACLs for Granular Traffic Analysis 81

    Analyzing Network Traffic and Applications 83

    Using Tools for Analyzing Network Traffic 84

        Reviewing Network Traffic Information 85

    Analyzing Network Health 85

    Creating a Draft Design Document 86

    Time Estimates for Performing Network Characterization 88

Using the Top-Down Approach to Network Design 89

    Top-Down Approach to Network Design 90

        Top-Down Design Example 91

    Decision Tables in Network Design 91

    Assessing the Scope of the Network Design Project 93

    Using Structured Design Principles 93

        Logical Structure 94

        Physical Structure 95

    Network Design Tools 95

    Testing the Design 96

    Planning an Implementation 97

    Documenting the Design 98

Summary 100

References 100

Review Questions 101

Chapter 3 Structuring and Modularizing the Network 103

Designing the Network Hierarchy 103

    Introducing the Hierarchical Network Model 104

    Describing Access Layer Functionality 106

        Campus Access Layer Connectivity 107

    Describing Distribution Layer Functionality 108

        Virtual Switches 110

    Describing Core Layer Functionality 111

Using a Modular Approach in Network Design 114

    Describing the Enterprise Campus Functional Area 117

        Enterprise Campus Infrastructure Module 117

        Data Center Module 117

    Describing the Enterprise Edge Area 119

        E-Commerce Module 121

        Internet Connectivity Module 121

        WAN and MAN and Site-to-Site VPN Module 122

        Remote Access and VPN Module 122

    Describing the Service Provider Area 122

        ISP Module 123

        Public Switched Telephone Network Module 123

        Frame Relay and ATM Module 123

    Describing the Remote Area 124

        Enterprise Branch Module 124

        Enterprise Data Center Module 125

        Enterprise Teleworker Module 125

Supporting Services on Borderless Networks 126

    Explaining the Role of Borderless Network Services 126

    Mobility Considerations 128

    Security Infrastructure Services 129

        Designing Security to Protect Against External Threats 132

    Application Performance Considerations 134

        Resolving Application Issues with Cisco Application Network Services 135

        Cisco ANS Components 135

    IP Communications 136

        Voice Transport 137

    High-Availability Network Services 141

        Full-Mesh Versus Partial-Mesh Redundancy 142

Identifying Network Management Protocols and Features 145

    Network Management Overview 145

    SNMP 146

    SNMP Message Types 147

        SNMP Version 2 148

        SNMP Version 3 149

    MIB Characteristics 150

        MIB Variable Retrieval 152

    Using RMON 153

    NetFlow Characteristics 155

        NetFlow Versus RMON Information Gathering 157

        Applications Using NetFlow 158

    Cisco Discovery Protocol Features 159

    Syslog Features 160

Summary 164

References 164

Review Questions 164

Chapter 4 Designing Basic Campus and Data Center Networks 167

Describing Campus Design Considerations 167

    Campus Design Factors 168

    Network Application Characteristics and Considerations 168

        Peer-Peer Applications 169

        Client—Local Server Applications 170

        Client—Data Center Applications 170

        Client—Enterprise Edge Applications 172

    Application Requirements 173

    Environmental Characteristics and Considerations 174

        Intrabuilding Structure 174

        Interbuilding Structure 175

        Distant Remote Building Structure 175

        Transmission Media Considerations 176

        Copper 176

        Optical Fiber 177

        Wireless 177

        Campus Transmission Media Comparison 178

        Transmission Media Cabling Example 179

    Infrastructure Device Characteristics and Considerations 179

        Quality of Service (QoS) 180

Designing the Campus Infrastructure Module 181

    Design Considerations for the Campus Network 181

    Design Considerations for the Building Access Layer 182

        Managing VLANs and STP 183

        Managing Trunks Between Switches 186

        Managing Default PAgP Settings 186

        Consider Implementing Routing in the Building Access Layer 186

    Design Considerations for the Building Distribution Layer 187

        Best Practices in the Distribution Layer 187

        Using First-Hop Redundancy Protocols 188

        Deploying Layer 3 Routing Protocols 189

        Using the Virtual Switching System at the Distribution Layer 191

    Campus Core Design Considerations 192

        Small and Medium Campus Design Options 195

        Edge Distribution at the Campus Core 196

Describing Enterprise Data Center Considerations 197

    Describing the Enterprise Data Center Architectures 197

    Cisco Enterprise Data Center Architecture Framework 198

        Server Challenges 200

        Data Center Facility Aspects 200

    Enterprise Data Center Infrastructure 205

        Data Center Access Layer 206

        Data Center Aggregation Layer 207

        Data Center Core Layer 207

Describing Enterprise Network Virtualization Tools 208

    Virtualization Challenges 208

    What Is Virtualization? 209

    Types of Virtualization 209

    Virtualization Technologies 210

    Network Virtualization Design Considerations 211

Summary 212

References 212

Review Questions 213

Chapter 5 Designing Remote Connectivity 215

Identifying WAN Technology Considerations 215

    Review of WAN Features 216

    Comparison of WAN Transport Technologies 217

        Time-Division Multiplexing 218

        ISDN Connectivity 218

        Frame Relay 219

        Multiprotocol Label Switching 219

        Metro Ethernet 219

        DSL Technology 220

        Cable Technology 221

        Wireless Technology 221

        SONET and SDH Technology 222

        DWDM Technology 223

        Dark Fiber 224

    WAN Link Categories 224

    WAN Transport Technology Pricing and Contract Considerations 225

    WAN Design Requirements 226

        Response Time 227

        Throughput 227

        Packet Loss 228

        Reliability 228

    QoS Considerations for Bandwidth Constraints 228

        Classification 229

        Congestion Management 230

        Traffic Shaping and Policing 231

        Link Efficiency 232

        Window Size 233

Designing the Enterprise WAN 233

    Traditional WAN Designs 234

        Star Topology 234

        Fully Meshed Topology 235

        Partially Meshed Topology 235

    Remote-Access Network Design 235

    VPN Design 236

    Enterprise Versus Service Provider—Managed VPNs 237

        Enterprise Managed VPN: IPsec 237

        Service Provider—Managed VPNs: MPLS 242

        Service Provider—Managed VPNs: Metro Ethernet 242

        Service Provider—Managed VPNs: VPLS 243

    WAN Backup Strategy Design 244

        Using the Internet as a WAN Backup 245

    Selecting the Enterprise WAN Architecture 246

        Cisco Enterprise MAN and WAN Architecture 247

    Selecting Enterprise WAN Components 249

        Hardware Selection 249

Designing the Enterprise Branch 251

    Enterprise Branch Architecture 251

    Enterprise Branch Design 252

    New Features on the ISR G2 Routers 253

    Small Branch Office Design 254

    Medium Branch Office Design 255

    Large Branch Office Design 256

    Enterprise Teleworker (Cisco Virtual Office Solution) Design 256

    New ISRs for Small Offices and Teleworkers 257

Summary 259

References 259

Review Questions 260

Chapter 6 Designing IP Addressing 261

Designing IPv4 Addressing 261

    IPv4 Addressing 261

        Private and Public Addressing Guidelines 262

        Recommended Practices for NAT 262

    Developing an Addressing Plan 263

    Planning the IP Addressing Hierarchy 266

        Design Consideration: Route Summarization Groups 266

        Address Blocks by Location 267

        Hierarchical IP Addressing Plan 268

    Recommended Practices for Name Resolution 270

        Locating DHCP and DNS Servers in the Network 272

    IP Address Space Planning Road Map 272

Designing IPv6 Addressing 272

    IPv6 Addressing 273

        Benefits of IPv6 Addressing 273

        IPv6 Address Types 274

    IPv6 Address Assignment Strategies 277

    Identifying IPv6 Name Resolution 277

    Making the Transition from IPv4 to IPv6 278

    Strategies for IPv6 Deployment 279

        Dual-Stack Model 280

        Hybrid Model 281

        Service Block Model 284

Summary 285

References 286

Review Questions 287

Chapter 7 Designing and Selecting Routing Protocols 289

Reviewing Enterprise Routing Protocols 289

    Reviewing Routing Protocol Fundamentals 289

        Differentiating Between Distance Vector and Link-State Routing Protocols 289

        Differentiating Between Interior and Exterior Routing Protocols 292

        Differentiating Between Hierarchical and Flat Routing Protocols 293

        Routing Protocol Convergence 294

    Routing Protocols for the Enterprise 295

        EIGRP 295

        Open Shortest Path First 296

        Border Gateway Protocol 298

        IPv6 Routing 300

    Selecting an Enterprise Routing Protocol 301

        When to Choose EIGRP 301

        When to Choose OSPF 301

Designing a Routing Protocol Deployment 301

    Applying Routing Protocols to a Hierarchical Network Structure 301

        Routing in the Campus Core 302

        Routing in the Building Distribution Layer 302

        Routing in the Enterprise Edge Functional Area 302

    Route Redistribution 303

        Route Redistribution Planning 304

        Remote-Access and VPN and Internet Connectivity Module Route Redistribution 305

    Route Filtering 306

        Route Filtering and Internet Connectivity 306

    Route Summarization 306

        Recommended Practice: Summarize at the Distribution Layer 307

        Recommended Practice: Passive Interfaces for IGP at the Access Layer 308

        IPv6 Route Summarization 308

Summary 309

Review Questions 310

Chapter 8 Evaluating Security Solutions for the Network 311

Defining Network Security 311

    Network Security Background 312

        Security Legislation 312

    Threats and Risks 313

        Reconnaissance Attacks 314

        Vulnerability Assessment 315

        Example Threat: Gaining Unauthorized Access to Systems 316

        Example Risk: Loss of Availability 318

        Everything Is a Potential Target 319

Understanding Network Security Policy and Processes 319

    Definition of a Security Policy 319

    Risk Assessment and Management 320

    Example: Security Policy 322

    Network Security Is a Continuous Process 323

    Integrating Security Design and Network Design 324

Understanding the Cisco SAFE Approach 325

    Cisco SAFE Architecture 325

    The Network as a Platform for Security 326

    Cisco Security Control Framework 327

    Trust and Identity Management 328

        Trust 329

        Identity 330

        Access Control 331

    Trust and Identity Management Technologies 331

        Example: Cisco IBNS 332

        Example: Firewall Filtering Using ACLs 332

        Example: Cisco NAC Appliance 333

    Identity and Access Control Deployment Locations 333

    Threat Defense 335

        Incorporating Physical Security 335

        Infrastructure Protection 336

    Threat Detection and Mitigation 338

        Threat Detection and Mitigation Solutions 339

        Example: Cisco IronPort ESA 341

        Example: Cisco IronPort WSA 341

    Secure Connectivity 342

    Encryption Fundamentals 343

    VPN Protocols 344

    Ensuring Privacy 345

        Example: Providing Confidentiality over the Internet 347

        Example: Protecting Communication over the Public Infrastructure 347

        Example: Network Authentication over a VPN 347

    Maintaining Data Integrity 347

        Example: VPN Tunneling for Data Integrity 348

        Example: Implementation of Digital Signatures 349

    Security Management 349

Selecting Network Security Solutions 352

    Security Integration in Network Devices 352

        Cisco IOS Security 352

        Security Appliances 354

        Intrusion Prevention System 355

        Cisco Catalyst Services Modules 356

        Endpoint Security Solutions 357

    Securing the Enterprise Network 358

        Example: Deploying Identity and Access Control in the Enterprise Campus 358

        Example: Deploying Threat Detection and Mitigation in the Enterprise Campus 359

        Example: Deploying Infrastructure Protection in the Enterprise Campus 359

        Example: Deploying Security in the Enterprise Campus 359

        Example: Deploying Identity and Access Control in the Enterprise Data Center 361

        Example: Deploying Threat Detection and Mitigation in the Enterprise Data Center 361

        Example: Deploying Infrastructure Protection in the Enterprise Data Center 361

        Example: Deploying Security in the Data Center 361

        Example: Deploying Identity and Access Control in the Enterprise Edge 364

        Example: Deploying Threat Detection and Mitigation in the Enterprise Edge 364

        Example: Deploying Infrastructure Protection in the Enterprise Edge 364

        Example: Deploying Security in the Enterprise Edge 366

Summary 367

References 368

Review Questions 369

Chapter 9 Identifying Voice and Video Networking Considerations 371

Integrating Voice and Video Architectures 371

    Differentiating Between Analog and Digital Signaling 372

    Introducing Voice and Video over IP 373

    Voice and Video Standards 376

        Terminals 376

        Gateways 377

        Gatekeepers 377

        Multipoint Control Units 378

        H.264 379

    Introducing VoIP 379

        IP Telephony Design Models 381

    Introducing Video Considerations 385

        Media Application Models 386

        Delivery of Media Application 386

        Architectural Framework for Media Services 387

    Call Control and Transport Protocols 388

        Call Control Functions with H.323 388

        Voice Conversation with RTP 389

        Call Control Functions with SSCP 389

        Call Control Functions with SIP 390

        Call Control Functions with MGCP 392

Identifying the Requirements of Voice and Video Technologies 393

    Minimizing Delay, Jitter, and Loss 394

        One-Way Network Delay Recommendations 394

        Propagation Delay 394

        Serialization Delay 395

        Processing Delay 395

        Queuing Delay 395

        Dejitter Buffers 396

        Packet Loss 397

    Preventing Echo 398

        Echo Canceller Example 399

        Echo Cancellation Guidelines 399

    Voice Coding and Compression 399

        Codec Complexity, DSPs, and Voice Calls 402

    Bandwidth Considerations 402

        Reducing Voice Traffic with cRTP 403

        Reducing Voice Traffic with VAD 403

        Voice Bandwidth Calculation 404

        Typical Video Resolution and Bandwidth 406

    Using QoS for Voice and Video 407

        QoS Considerations for Voice and Video in the WAN 413

        Call Rerouting Alternatives 414

        Call Admission Control Examples 414

        Implementing CAC with RSVP 415

    Voice Traffic Engineering Overview 416

Summary 418

References 419

Review Questions 420

Chapter 10 Identifying Design Considerations for Basic Wireless Networking 421

Cisco Unified Wireless Network Review 421

    Cisco Unified Wireless Network Architecture 421

        Cisco Unified Wireless Network Elements 422

        CAPWAP and LWAPP Fundamentals 423

        Split Media Access Control 425

        Local Media Access Control 426

        Access Point Modes 427

    Wireless Infrastructure 428

        Wireless Authentication 430

    Overview of WLAN Controllers 432

    Access Point Support and Scaling 435

        Access Point Scalability Considerations 437

        Multiple AP Manager Interface Example 437

        Link Aggregation (LAG) with a Single AP Manager Interface Example 439

Wireless Network Controller Technology 440

    Lightweight Access Point Connectivity to a WLC 440

        WLC Selection 440

        Lightweight Access Point Operations 442

    Mobility in the Cisco Unified Wireless Network 442

        Intracontroller Roaming 443

        Intercontroller Roaming–Layer 2 444

        Intercontroller Roaming–Layer 3 444

        Mobility Groups 446

        Mobility Group Requirement Example 447

        Recommended Practices for Supporting Roaming 448

    Controller Redundancy Design 449

        Deterministic Controller Redundancy 449

        Dynamic Controller Redundancy 451

        N + 1 Redundancy Design 452

        N + N Redundancy Design 453

        N + N + 1 Redundancy Design 454

    Radio Resource Management (RRM) and RF Groups 455

        RF Grouping 456

        Access Point Self-Healing 458

Designing Wireless Networks Using Controllers 458

    RF Site Survey 458

        RF Site Survey Process 459

    Design Considerations for Campus Wireless Networks 466

        CAPWAP Access Point Feature Summary 466

        Controller Placement Design 467

        Campus Cisco Wireless LAN Controller Options 469

    Design Considerations for Branch Wireless Networks 470

        Hybrid REAP 470

        Branch Office Cisco Wireless LAN Controller Options 472

    Design Considerations for Guest Services in Wireless Networks 474

    Design Considerations for Outdoor Wireless Networks 474

        Wireless Mesh Components 476

        Mesh Design Recommendations 477

Summary 478

References 478

Review Questions 479

Appendix A Answers to Review Questions 481

Appendix B Acronyms and Abbreviations 489

9781587204241   TOC   6/29/2011

More Information

Pearson IT Certification Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Pearson IT Certification and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about Pearson IT Certification products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites; develop new products and services; conduct educational research; and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by Adobe Press. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.pearsonitcertification.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020