Home > Store

CompTIA Security+ SYO-301 Cert Guide, Deluxe Edition, 2nd Edition

Register your product to gain access to bonus material or receive a coupon.

CompTIA Security+ SYO-301 Cert Guide, Deluxe Edition, 2nd Edition

EPUB (Watermarked)

Not for Sale

About

Features

  • Master CompTIA’s Security+ SY0-301 exam topics
  • Assess your knowledge with chapter-ending quizzes
  • Review key concepts with exam preparation tasks
  • Practice with realistic exam questions on the DVD
  • Includes complete video solutions to the 25 hands-on labs
  • Plus 25 interactive learning activities on key exam topics
  • Description

    • Copyright 2012
    • Dimensions: 7-3/8" x 9-1/8"
    • Edition: 2nd
    • EPUB (Watermarked)
    • ISBN-10: 0-13-280129-9
    • ISBN-13: 978-0-13-280129-4

    Learn, prepare, and practice for CompTIA Security+ SY0-301exam success with this CompTIA Authorized Cert Guide, Deluxe Edition from Pearson IT Certification, a leader in IT Certification learning and a CompTIA Authorized Platinum Partner. The DVD features three complete practice exams, complete video solutions to the 25 hands-on labs, plus 25 interactive flash-based learning activities that include drag-n-drop and matching to reinforce the learning.

    • Master CompTIA’s Security+ SY0-301 exam topics
    • Assess your knowledge with chapter-ending quizzes
    • Review key concepts with exam preparation tasks
    • Practice with realistic exam questions on the DVD
    • Includes complete video solutions to the 25 hands-on labs
    • Plus 25 interactive learning activities on key exam topics

    Limited Time Offer: Buy CompTIA Security+ SY0-301 Authorized Cert Guide, Deluxe Edition and receive a 10% off discount code for the CompTIA Security+ SYO-301 exam.  To receive your 10% off discount code:

    1.       Register your product at pearsonITcertification.com/register

    2.       Follow the instructions

    3.       Go to your Account page and click on “Access Bonus Content”


    CompTIA Security+ SY0-301 Authorized Cert Guide, Deluxe Edition includes video solutions to the hands-on labs, practice tests, and interactive activities that let the reader learn by doing. Best-selling author and expert instructor David Prowse shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics.

    The book presents you with an organized test preparation routine through the use of proven series elements and techniques. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. Review questions help you assess your knowledge, and a final preparation chapter guides you through tools and resources to help you craft your approach to passing the exam.

    The companion Deluxe Edition DVD contains the powerful Pearson IT Certification Practice Test engine, with three complete practice exams and hundreds of exam-realistic questions. The assessment engine offers you a wealth of customization options and reporting features, laying out a complete assessment of your knowledge to help you focus your study where it is needed most. The Deluxe Edition DVD also includes complete video solutions to the 25 hands-on labs in the book and 25 interactive learning activities on key exam topics to reinforce the learning by doing. Learning activities such as test password strength, match the type of Malware with its definition, find the security issues in the network map, and disallow a user access to the network on Saturday and Sunday.

    Interactive Learning Activities:

    • 2.1 Filtering Emails
    • 2.2 Malware Types
    • 2.3 Securing the BIOS
    • 3.1 Stopping Services in the Command Prompt
    • 3.2 Patch Management
    • 5.1 Port Numbers, Part 1
    • 5.2 Port Numbers, Part 2
    • 5.3 Port Numbers, Part 3
    • 5.4 Network Attacks, Part 1
    • 5.5 Network Attacks, Part 2
    • 5.6 Network Attacks, Part 3
    • 5.7 Network Attacks, Part 4
    • 6.1 Network Security
    • 7.1 Password Strength
    • 8.1 802.1X Components
    • 8.2 Authentication Types
    • 9.1 Access Control Models
    • 9.2 Configuring Logon Hours
    • 10.1 Risk Assessment, Part 1
    • 10.2 Risk Assessment, Part 2
    • 10.3 Vulnerability Management Process
    • 11.1 Packet Analysis
    • 12.1 Symmetric and Asymmetric Algorithms
    • 14.1 RAID Levls
    • 15.1 Social Engineering Types

    Hands-On Labs:

    • 2-1 Using Free Malware Scanning Programs
    • 2-2 How to Secure the BIOS
    • 3-1 Discerning & Updating Service Pack Level
    • 3-2 Creating a Virtual Machine
    • 3-3 Securing a Virtual Machine
    • 4-1 Securing the Browser
    • 4-2 Disabling Applications
    • 5-1 Port Scanning Basics
    • 6-1 Packet Filtering and NAT Firewalls
    • 6-2 Configuring Inbound Filter on a Firewall
    • 6-3 Enabling MAC Filtering
    • 7-1 Securing a Wireless Device: 8 Steps
    • 7-2 Wardriving and the Cure
    • 8-1 Enabling 802.1X on a Network Adapter
    • 8-2 Setting Up a VPN
    • 9-1 Password Policies and User Accounts
    • 9-2 Configuring User and Group Permissions
    • 10-1 Mapping and Scanning the Network
    • 10-2 Password Cracking and Defense
    • 11-1 Using Protocol Analyzers
    • 12-1 Disabling LM Hash in Windows Server 2003
    • 13-1 A Basic Example of PKI
    • 13-2 Making an SSH Connection
    • 14-1 Configuring RAID 1 and 5
    • 16-1 How to Approach Exam Questions

    Well-regarded for its level of detail, assessment features, and challenging review questions and exercises, this CompTIA  authorized study guide helps you master the concepts and techniques that will enable you to succeed on the exam the first time.

    The CompTIA authorized study guide helps you master all the topics on the Security+ exam, including

    • Core computer system security
    • OS hardening and virtualization
    • Application security
    • Network design elements and threats
    • Perimeter security
    • Network media and devices security
    • Physical security and authentication models
    • Access control
    • Vulnerability and risk assessment
    • Monitoring and auditing
    • Cryptography, including PKI
    • Redundancy and disaster recovery
    • Policies and procedures

    Companion Deluxe Edition DVD

    The Deluxe Edition DVD contains three free, complete practice exams, video solutions to the 25 hands-on labs plus 25 interactive flash-based learning activities that include drag-n-drop and matching to reinforce the learning. Includes Exclusive Offer for 70% Off Premium Edition eBook and Practice Test.

    Pearson IT Certification Practice Test minimum system requirements:

    Windows XP (SP3), Windows Vista (SP2), or Windows 7; Microsoft .NET Framework 4.0 Client; Pentium class 1GHz processor (or equivalent); 512 MB RAM; 650 MB hard disk space plus 50 MB for each downloaded practice exam.

    Downloads

    Downloads

    Download appendix files here:

    Appendix A Memory Tables

    Appendix B Memory Tables Solutions

    Hands on Labs

    Sample Content

    Table of Contents

    Introduction xxv

    Chapter 1 Introduction to Security 3

    Foundation Topics 4

    Security 101 4

        The CIA of Computer Security 4

        The Basics of Information Security 6

    Think Like a Hacker 9

    Exam Preparation Tasks 11

    Review Key Topics 11

    Define Key Terms 11

    Answer Review Questions 11

    Answers and Explanations 13

    Chapter 2 Computer Systems Security 17

    Foundation Topics 18

    Computer Systems Security Threats 18

        Malicious Software 18

            Viruses 18

            Worms 19

            Trojan Horses 20

            Spyware 21

            Rootkits 21

            Spam 21

            Summary of Malware Threats 22

        Ways to Deliver Malicious Software 23

            Via Software, Messaging, and Media 23

            Active Interception 23

            Privilege Escalation 24

            Backdoors 24

            Logic Bombs 24

            Botnets and Zombies 25

        Preventing and Troubleshooting Malware 26

            Preventing and Troubleshooting Viruses 26

            Preventing and Troubleshooting Worms and Trojans 30

            Preventing and Troubleshooting Spyware 30

            Preventing and Troubleshooting Rootkits 32

            Preventing and Troubleshooting Spam 33

            You Can’t Save Every Computer from Malware! 35

            Summary of Malware Prevention Techniques 35

    Implementing Security Applications 36

        Personal Software Firewalls 36

        Host-Based Intrusion Detection Systems 38

        Pop-Up Blockers 40

        Data Loss Prevention Systems 42

    Securing Computer Hardware and Peripherals 42

        Securing the BIOS 43

        Securing Storage Devices 44

            Removable Storage 44

            Network Attached Storage 45

            Whole Disk Encryption 45

            Hardware Security Modules 47

        Securing Cell Phones and Smartphones 47

    Exam Preparation Tasks 49

    Review Key Topics 49

    Complete Tables and Lists from Memory 49

    Define Key Terms 50

    Hands-On Labs 50

        Equipment Needed 50

        Lab 2-1: Using Free Malware Scanning Programs 50

        Lab 2-2: How to Secure the BIOS 51

    View Recommended Resources 53

    Answer Review Questions 54

    Answers and Explanations 60

    Chapter 3 OS Hardening and Virtualization 67

    Foundation Topics 68

    Hardening Operating Systems 68

        Removing Unnecessary Applications and Services 68

        Service Packs 72

        Windows Update, Patches, and Hotfixes 75

            Patches and Hotfixes 77

            Patch Management 79

        Group Policies, Security Templates, and Configuration Baselines 80

        Hardening File Systems and Hard Drives 82

    Virtualization Technology 86

        Types of Virtualization and Their Purposes 86

        Working with Virtual Machines 88

            Microsoft Virtual PC 88

            Microsoft Windows XP Mode 90

            Microsoft Virtual Server 90

            VMware 91

            Hypervisor 92

        Securing Virtual Machines 92

    Exam Preparation Tasks 94

    Review Key Topics 94

    Complete Tables and Lists from Memory 95

    Define Key Terms 95

    Hands-On Labs 95

        Equipment Needed 95

        Lab 3-1: Discerning and Updating the Service Pack Level 96

        Lab 3-2: Creating a Virtual Machine in Virtual PC 2007 96

        Lab 3-3: Securing a Virtual Machine 98

    View Recommended Resources 101

    Answer Review Questions 102

    Answers and Explanations 105

    Chapter 4 Application Security 109

    Foundation Topics 110

    Securing the Browser 110

        General Browser Security Procedures 111

            Implement Policies 111

            Train Your Users 114

            Use a Proxy and Content Filter 114

            Secure Against Malicious Code 116

        Securing Internet Explorer 116

        Securing Firefox 121

    Securing Other Applications 124

    Secure Programming 127

        Systems Development Life Cycle 128

        Programming Testing Methods 130

        Programming Vulnerabilities and Attacks 132

            Backdoors 132

            Buffer Overflows 132

            XSS and XSRF 133

            More Code Injection Examples 133

            Directory Traversal 134

            Zero Day Attack 135

    Exam Preparation Tasks 136

    Review Key Topics 136

    Complete Tables and Lists from Memory 136

    Define Key Terms 137

    Hands-On Labs 137

        Equipment Needed 137

        Lab 4-1: Securing the Browser 137

        Lab 4-2: Disabling Applications with a Windows Server 2008 Policy 138

    View Recommended Resources 141

    Answer Review Questions 141

    Answers and Explanations 145

    Chapter 5 Network Design Elements and Network Threats 149

    Foundation Topics 150

    Network Design 150

        Network Devices 150

            Hub 150

            Switch 151

            Router 152

        Network Address Translation, and Private Versus Public IP 154

        Network Zones and Interconnections 156

            LAN Versus WAN 157

            Internet 157

            Demilitarized Zone (DMZ) 157

            Intranets and Extranets 159

            Cloud Computing 159

        Network Access Control (NAC) 162

        Subnetting 162

        Virtual Local Area Network (VLAN) 164

        Telephony Devices 165

            Modems 166

            PBX Equipment 166

            VoIP 167

    Ports and Protocols 167

        Ports Ranges, Inbound Versus Outbound, and Common Ports 167

        Protocols That Can Cause Anxiety on the Exam 174

    Malicious Network Attacks 175

        DoS 175

        DDoS 178

        Spoofing 178

        Session Hijacking 179

        Replay 181

        Null Sessions 181

        Transitive Access and Client-Side Attacks 182

        DNS Poisoning and Other DNS Attacks 183

        ARP Poisoning 184

        Summary of Network Attacks 185

    Exam Preparation Tasks 188

    Review Key Topics 188

    Complete Tables and Lists from Memory 189

    Define Key Terms 189

    Hands-On Labs 189

        Equipment Needed 190

        Lab 5-1: Port Scanning Basics 190

    View Recommended Resources 191

    Answer Review Questions 192

    Answers and Explanations 199

    Chapter 6 Network Perimeter Security 205

    Foundation Topics 206

    Firewalls and Network Security 206

        Firewalls 207

        Proxy Servers 212

        Honeypots and Honeynets 215

        Data Loss Prevention (DLP) 216

    NIDS Versus NIPS 217

        NIDS 217

        NIPS 218

        Summary of NIDS Versus NIPS 219

        The Protocol Analyzer’s Role in NIDS and NIPS 220

    Exam Preparation Tasks 220

    Review Key Topics 220

    Complete Tables and Lists from Memory 221

    Define Key Terms 221

    Hands-On Labs 221

        Equipment Needed 222

        Lab 6-1: Packet Filtering and NAT Firewalls 222

        Lab 6-2: Configuring an Inbound Filter on a SOHO Router/Firewall 223

        Lab 6-3: Enabling MAC Filtering 224

    View Recommended Resources 225

    Answer Review Questions 225

    Answers and Explanations 229

    Chapter 7 Securing Network Media and Devices 233

    Foundation Topics 234

    Securing Wired Networks and Devices 234

        Network Device Vulnerabilities 234

            Default Accounts 234

            Weak Passwords 235

            Privilege Escalation 236

            Back Doors 237

            Network Attacks 237

            Other Network Device Considerations 238

        Cable Media Vulnerabilities 238

            Interference 239

            Crosstalk 240

            Data Emanation 241

            Tapping into Data and Conversations 241

    Securing Wireless Networks 244

        Wireless Access Point Vulnerabilities 244

            Secure the Administration Interface 244

            SSID Broadcast 245

            Rogue Access Points 245

            Evil Twin 246

            Weak Encryption 246

            Other Wireless Access Point Security Strategies 248

        Wireless Transmission Vulnerabilities 250

        Bluetooth Vulnerabilities 250

            Bluejacking 251

            Bluesnarfing 251

    Exam Preparation Tasks 252

    Review Key Topics 252

    Complete Tables and Lists from Memory 253

    Define Key Terms 253

    Hands-On Labs 253

        Equipment Needed 254

        Lab 7-1: Securing a Wireless Device: 8 Steps to a Secure Network 254

        Lab 7-2: Wardriving...and The Cure 256

    View Recommended Resources 257

    Answer Review Questions 257

    Answers and Explanations 261

    Chapter 8 Physical Security and Authentication Models 265

    Foundation Topics 267

    Physical Security 267

        General Building and Server Room Security 267

        Door Access 268

        Biometric Readers 270

    Authentication Models and Components 271

        Authentication Models 271

        Localized Authentication Technologies 273

            802.1X and EAP 273

            LDAP 276

            Kerberos and Mutual Authentication 277

            Terminal Services 279

        Remote Authentication Technologies 279

            Remote Access Service 280

            Virtual Private Networks 281

            RADIUS Versus TACACS 284

    Exam Preparation Tasks 286

    Review Key Topics 286

    Complete Tables and Lists from Memory 287

    Define Key Terms 287

    Hands-On Labs 287

        Equipment Needed 288

        Lab 8-1: Enabling 802.1X on a Network Adapter 288

        Lab 8-2: Setting Up a VPN 289

    View Recommended Resources 291

    Answer Review Questions 292

    Answers and Explanations 299

    Chapter 9 Access Control Methods and Models 305

    Foundation Topics 306

    Access Control Models Defined 306

        Discretionary Access Control 306

        Mandatory Access Control 308

        Role-Based Access Control (RBAC) 309

        Access Control Wise Practices 310

    Rights, Permissions, and Policies 313

        Users, Groups, and Permissions 313

            Permission Inheritance and Propagation 317

        Moving and Copying Folders and Files 318

        Usernames and Passwords 318

        Policies 322

        User Account Control (UAC) 325

    Exam Preparation Tasks 326

    Review Key Topics 326

    Complete Tables and Lists from Memory 327

    Define Key Terms 327

    Hands-On Labs 327

        Equipment Needed 327

        Lab 9-1: Configuring Password Policies and User Account Restrictions 328

        Lab 9-2: Configuring User and Group Permissions 330

    View Recommended Resources 331

    Answer Review Questions 332

    Answers and Explanations 337

    Chapter 10 Vulnerability and Risk Assessment 341

    Foundation Topics 342

    Conducting Risk Assessments 342

        Qualitative Risk Assessment 344

        Quantitative Risk Assessment 344

        Security Analysis Methodologies 346

        Security Controls 347

        Vulnerability Management 349

            Penetration Testing 350

            OVAL 351

    Assessing Vulnerability with Security Tools 352

        Network Mapping 352

        Vulnerability Scanning 355

        Network Sniffing 358

        Password Analysis 359

    Exam Preparation Tasks 363

    Review Key Topics 363

    Complete Tables and Lists from Memory 363

    Define Key Terms 364

    Hands-On Labs 364

        Equipment Needed 364

        Lab 10-1: Mapping and Scanning the Network 365

        Lab 10-2: Password Cracking and Defense 366

    View Recommended Resources 367

    Answer Review Questions 368

    Answers and Explanations 374

    Chapter 11 Monitoring and Auditing 379

    Foundation Topics 380

    Monitoring Methodologies 380

        Signature-Based Monitoring 380

        Anomaly-Based Monitoring 381

        Behavior-Based Monitoring 381

    Using Tools to Monitor Systems and Networks 382

        Performance Baselining 382

        Protocol Analyzers 384

            Wireshark 385

            Network Monitor 386

            SNMP 388

    Conducting Audits 389

        Auditing Files 389

        Logging 392

        Log File Maintenance and Security 394

        Auditing System Security Settings 396

    Exam Preparation Tasks 399

    Review Key Topics 399

    Complete Tables and Lists from Memory 400

    Define Key Terms 400

    Hands-On Labs 400

        Equipment Needed 400

        Lab 11-1: Using Protocol Analyzers 401

    View Recommended Resources 403

    Answer Review Questions 404

    Answers and Explanations 409

    Chapter 12 Encryption and Hashing Concepts 415

    Foundation Topics 416

    Cryptography Concepts 416

        Symmetric Versus Asymmetric Key Algorithms 419

            Symmetric Key Algorithms 420

            Asymmetric Key Algorithms 421

            Public Key Cryptography 421

        Key Management 422

        Steganography 423

    Encryption Algorithms 423

        DES and 3DES 424

        AES 424

        RC 425

        Summary of Symmetric Algorithms 426

        RSA 426

        Diffie-Hellman 427

        Elliptic Curve 428

        More Encryption Types 428

            One-Time Pad 428

            PGP 429

    Hashing Basics 430

        Cryptographic Hash Functions 431

            MD5 432

            SHA 432

            Happy Birthday! 432

        LANMAN, NTLM, and NTLM2 433

            LANMAN 433

            NTLM and NTLM2 435

    Exam Preparation Tasks 436

    Review Key Topics 436

    Complete Tables and Lists from Memory 436

    Define Key Terms 436

    Hands-On Lab 437

        Equipment Needed 437

        Lab 12-1: Disabling the LM Hash in Windows Server 2003 437

    View Recommended Resources 438

    Answer Review Questions 439

    Answers and Explanations 445

    Chapter 13 PKI and Encryption Protocols 451

    Foundation Topics 452

    Public Key Infrastructure 452

        Certificates 452

        Certificate Authorities 453

        Single-Sided and Dual-Sided Certificates 456

        Web of Trust 456

    Security Protocols 457

        S/MIME 457

        SSL/TLS 458

        SSH 459

        PPTP, L2TP, and IPsec 459

            PPTP 460

            L2TP 460

            IPsec 460

    Exam Preparation Tasks 461

    Review Key Topics 461

    Define Key Terms 462

    Hands-On Labs 462

        Equipment Needed 462

        Lab 13-1: A Basic Example of PKI 462

        Lab 13-2: Making an SSH Connection 463

    View Recommended Resources 465

    Answer Review Questions 465

    Answers and Explanations 470

    Chapter 14 R edundancy and Disaster Recovery 475

    Foundation Topics 476

    Redundancy Planning 476

        Redundant Power 478

            Redundant Power Supplies 479

            Uninterruptible Power Supplies 480

            Backup Generators 481

        Redundant Data 483

        Redundant Networking 486

        Redundant Servers 488

        Redundant Sites 489

    Disaster Recovery Planning and Procedures 490

        Data Backup 490

        DR Planning 494

    Exam Preparation Tasks 497

    Review Key Topics 497

    Complete Tables and Lists from Memory 497

    Define Key Terms 498

    Hands-On Labs 498

        Equipment Needed 498

        Lab 14-1: Configuring RAID 1 and 5 498

    View Recommended Resources 500

    Answer Review Questions 500

    Answers and Explanations 504

    Chapter 15 Policies, Procedures, and People 509

    Foundation Topics 510

    Environmental Controls 510

        Fire Suppression 510

            Fire Extinguishers 510

            Sprinkler Systems 512

            Special Hazard Protection Systems 512

        HVAC 513

        Shielding 514

    Social Engineering 515

        Pretexting 516

        Diversion Theft 516

        Phishing 516

        Hoaxes 518

        Shoulder Surfing 518

        Eavesdropping 518

        Dumpster Diving 519

        Baiting 519

        Piggybacking/Tailgating 519

        Summary of Social Engineering Types 519

        User Education and Awareness 520

    Legislative and Organizational Policies 521

        Data Sensitivity and Classification of Information 522

        Personnel Security Policies 524

            Privacy Policies 525

            Acceptable Use 525

            Change Management 525

            Separation of Duties/Job Rotation 526

            Mandatory Vacations 526

            Due Diligence 527

            Due Care 527

            Due Process 527

            User Education and Awareness Training 527

            Summary of Personnel Security Policies 528

        How to Deal with Vendors 529

        How to Dispose of Computers and Other IT Equipment Securely 529

        Incident Response Procedures 531

    Exam Preparation Tasks 534

    Review Key Topics 534

    Complete Tables and Lists from Memory 535

    Define Key Terms 535

    View Recommended Resources 535

    Answer Review Questions 536

    Answers and Explanations 543

    Chapter 16 Taking the Real Exam 551

    Foundation Topics 552

    Getting Ready and the Exam Preparation Checklist 552

    Tips for Taking the Real Exam 555

    Beyond the CompTIA Security+ Certification 558

    Hands-On Lab 559

    Practice Exam 1 561

    Practice Exam 2 611

    Glossary 663

    Master List of Key Topics 685

    On the DVD:

    Appendix A: Memory Tables

    Appendix B: Memory Tables Answer Key

    9780789748270   TOC   11/29/2011

    Updates

    Submit Errata

    More Information

    Pearson IT Certification Promotional Mailings & Special Offers

    I would like to receive exclusive offers and hear about products from Pearson IT Certification and its family of brands. I can unsubscribe at any time.

    Overview


    Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about Pearson IT Certification products and services that can be purchased through this site.

    This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

    Collection and Use of Information


    To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

    Questions and Inquiries

    For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

    Online Store

    For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

    Surveys

    Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites; develop new products and services; conduct educational research; and for other purposes specified in the survey.

    Contests and Drawings

    Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

    Newsletters

    If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

    Service Announcements

    On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

    Customer Service

    We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

    Other Collection and Use of Information


    Application and System Logs

    Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

    Web Analytics

    Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

    Cookies and Related Technologies

    This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

    Do Not Track

    This site currently does not respond to Do Not Track signals.

    Security


    Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

    Children


    This site is not directed to children under the age of 13.

    Marketing


    Pearson may send or direct marketing communications to users, provided that

    • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
    • Such marketing is consistent with applicable law and Pearson's legal obligations.
    • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
    • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

    Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

    Correcting/Updating Personal Information


    If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

    Choice/Opt-out


    Users can always make an informed choice as to whether they should proceed with certain services offered by Adobe Press. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.pearsonitcertification.com/u.aspx.

    Sale of Personal Information


    Pearson does not rent or sell personal information in exchange for any payment of money.

    While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

    Supplemental Privacy Statement for California Residents


    California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

    Sharing and Disclosure


    Pearson may disclose personal information, as follows:

    • As required by law.
    • With the consent of the individual (or their parent, if the individual is a minor)
    • In response to a subpoena, court order or legal process, to the extent permitted or required by law
    • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
    • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
    • To investigate or address actual or suspected fraud or other illegal activities
    • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
    • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
    • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

    Links


    This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

    Requests and Contact


    Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

    Changes to this Privacy Notice


    We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

    Last Update: November 17, 2020