Home > Store

Networking Essentials: A CompTIA Network+ N10-007 Textbook, 5th Edition

Register your product to gain access to bonus material or receive a coupon.

Networking Essentials: A CompTIA Network+ N10-007 Textbook, 5th Edition


  • Your Price: $68.00
  • List Price: $80.00
  • Usually ships in 24 hours.



  • Provides a practical approach to introductory networking concepts
  • Presents tons of hands-on activities to help students learn by doing
  • Clearly outlines goals for each chapter with chapter-opening objectives and introductions
  • Highlights key terms and acronyms in the margins to enhance retention of networking terminology
  • Guides readers through application of concepts through configuring, analyzing, and troubleshooting sections
  • Includes extensive problem sets, summaries, questions, and problems (including critical thinking questions) at the end of each chapter to assess learning
  • Allows students to practice custom-designed, hands-on router and switch configuration exercises with the Net-Challenge software


  • Copyright 2018
  • Dimensions: 8" x 10"
  • Pages: 768
  • Edition: 5th
  • Book
  • ISBN-10: 0-7897-5874-1
  • ISBN-13: 978-0-7897-5874-3

Thoroughly updated to reflect the CompTIA Network+ N10-007 exam, Networking Essentials, Fifth Edition is a practical, up-to-date, and hands-on guide to the basics of networking. Written from the viewpoint of a working network administrator, it requires absolutely no experience with either network concepts or day-to-day network management.

Networking Essentials, Fifth Edition guides readers from an entry-level knowledge in computer networks to advanced concepts in Ethernet and TCP/IP networks; routing protocols and router configuration; local, campus, and wide area network configuration; network security; wireless networking; optical networks; Voice over IP; the network server; and Linux networking. This edition contains additional coverage of switch security, troubleshooting IP networks, authorization and access control, best practices for disaster recovery, network infrastructure configuration and management, data traffic network analysis, network security, and VoIP. It also covers approximately 250 new terms now addressed by CompTIA’s N10-007 exam.

Clear goals are outlined for each chapter, and every concept is introduced in easy-to-understand language that explains how and why networking technologies are used. Each chapter is packed with real-world examples and practical exercises that reinforce all concepts and guide you through using them to configure, analyze, and fix networks.

The companion web site features labs, Wireshark captures, and chapter quizzes.


  • NET-CHALLENGE SIMULATION SOFTWARE provides hands-on experience with entering router and switch commands, setting up functions, and configuring interfaces and protocols
  • WIRESHARK NETWORK PROTOCOL ANALYZER presents techniques and examples of data traffic analysis throughout
  • PROVEN TOOLS FOR MORE EFFECTIVE LEARNING AND NETWORK+ PREP, including chapter outlines, summaries, and Network+ objectives
  • WORKING EXAMPLES IN EVERY CHAPTER to reinforce key concepts and promote mastery
  • KEY TERM DEFINITIONS, LISTINGS, AND EXTENSIVE GLOSSARY to help you master the language of networking

Sample Content

Sample Pages

Download the sample pages (includes Chapter 1)

Table of Contents

Introduction xxii
CHAPTER 1 Introduction to Computer Networks 2
Chapter Outline 3
Objectives 3
Key Terms 3
1-1 Introduction 5
1-2 Network Topologies 7
Section 1-2 Review 11
Test Your Knowledge 11
1-3 The OSI Model 12
Section 1-3 Review 14
Test Your Knowledge 15
1-4 The Ethernet LAN 16
IP Addressing 20
Section 1-4 Review 22
Test Your Knowledge 23
1-5 Home Networking 24
Securing a Home Network 33
IP Addressing in a Home Network 34
Section 1-5 Review 36
Test Your Knowledge 37
1-6 Assembling an Office LAN 38
Section 1-6 Review 43
Test Your Knowledge 43
1-7 Testing and Troubleshooting a LAN 44
Section 1-7 Review 47
Test Your Knowledge 47
Summary 48
Questions and Problems 48
Certification Questions 56
CHAPTER 2 Physical Layer Cabling: Twisted-Pair 60
Chapter Outline 61
Objectives 61
Key Terms 61
2-1 Introduction 63
2-2 Structured Cabling 64
Horizontal Cabling 67
Section 2-2 Review 70
Test Your Knowledge 70
2-3 Unshielded Twisted-Pair Cable 71
Shielded Twisted-Pair Cable 74
Section 2-3 Review 75
Test Your Knowledge 75
2-4 Terminating CAT6/5e/5 UTP Cables 76
Computer Communication 78
Straight-through and Crossover Patch Cables 80
Section 2-4 Review 87
Test Your Knowledge 88
2-5 Cable Testing and Certification 89
Section 2-5 Review 93
Test Your Knowledge 93
2-6 10 Gigabit Ethernet over Copper 94
Overview 94
Alien Crosstalk 95
Signal Transmission 96
Section 2-6 Review 97
Test Your Knowledge 97
2-7 Troubleshooting Cabling Systems 98
Installation 98
Cable Stretching 99
Cable Failing to Meet Manufacturer Specifications 99
CAT5e Cable Test Examples 100
Section 2-7 Review 106
Test Your Knowledge 106
Summary 107
Questions and Problems 107
Certification Questions 115
CHAPTER 3 Physical Layer Cabling: Fiber Optics 118
Chapter Outline 119
Objectives 119
Key Terms 119
3-1 Introduction 120
3-2 The Nature of Light 123
Graded-Index Fiber 127
Single-Mode Fibers 127
Section 3-2 Review 128
Test Your Knowledge 129
3-3 Fiber Attenuation and Dispersion 129
Attenuation 129
Dispersion 131
Dispersion Compensation 132
Section 3-3 Review 133
Test Your Knowledge 133
3-4 Optical Components 134
Intermediate Components 135
Detectors 136
Fiber Connectorization 138
Section 3-4 Review 139
Test Your Knowledge 140
3-5 Optical Networking 140
Defining Optical Networking 141
Building Distribution 143
Campus Distribution 147
Section 3-5 Review 150
Test Your Knowledge 150
3-6 Safety 151
Section 3-6 Review 152
Test Your Knowledge 152
Summary 153
Questions and Problems 153
Certification Questions 156
CHAPTER 4 Wireless Networking 158
Chapter Outline 159
Objectives 159
Key Terms 159
4-1 Introduction 160
4-2 The IEEE 802.11 Wireless LAN Standard 161
Section 4-2 Review 169
Test Your Knowledge 170
4-3 802.11 Wireless Networking 170
Section 4-3 Review 180
Test Your Knowledge 181
4-4 Bluetooth, WiMAX, RFID, and Mobile Communications 181
Bluetooth 181
WiMAX 184
Radio Frequency Identification 185
Mobile (Cellular) Communications 188
Section 4-4 Review 189
Test Your Knowledge 189
4-5 Configuring a Point-to-Multipoint Wireless LAN: A Case Study 190
Step 1. Conducting an Antenna Site Survey 191
Step 2. Establishing a Point-to-Point Wireless Link to the Home Network 191
Steps 3 and 4. Configuring the Multipoint Distribution and Conducting an RF Site Survey 192
Step 5. Configuring the Remote Installations 194
Section 4-5 Review 195
Test Your Knowledge 195
Summary 196
Questions and Problems 196
Critical Thinking 200
Certification Questions 201
CHAPTER 5 Interconnecting the LANs 204
Chapter Outline 205
Objectives 205
Key Terms 205
5-1 Introduction 206
5-2 The Network Bridge 207
Section 5-2 Review 212
Test Your Knowledge 213
5-3 The Network Switch 213
Hub and Switch Comparison 216
Managed Switches 218
Multilayer Switches 223
Section 5-3 Review 224
Test Your Knowledge 224
5-4 The Router 225
The Router Interface: Cisco 2800 Series 226
Section 5-4 Review 229
Test Your Knowledge 230
5-5 Interconnecting LANs with the Router 230
Gateway Address 233
Network Segments 233
Section 5-5 Review 233
Test Your Knowledge 234
5-6 Configuring the Network Interface: Auto-negotiation 234
Auto-negotiation Steps 235
Full-Duplex/Half-Duplex 235
Section 5-6 Review 237
Test Your Knowledge 237
5-7 The Console Port Connection 238
Configuring the HyperTerminal Software (Windows) 240
Configuring the ZTerm Serial Communications Software (Mac) 242
Section 5-7 Review 244
Test Your Knowledge 244
Summary 245
Questions and Problems 245
Critical Thinking 250
Certification Questions 251
Chapter Outline 255
Objectives 255
Key Terms 255
6-1 Introduction 256
6-2 The TCP/IP Layers 257
The Application Layer 258
The Transport Layer 260
The Internet Layer 264
The Network Interface Layer 266
Section 6-2 Review 267
Test Your Knowledge 267
6-3 Number Conversion 268
Binary-to-Decimal Conversion 268
Decimal-to-Binary Conversion 270
Hexadecimal Numbers 271
Section 6-3 Review 274
Test Your Knowledge 274
6-4 IPv4 Addressing 274
Section 6-4 Review 278
Test Your Knowledge 278
6-5 Subnet Masks 278
Section 6-5 Review 285
Test Your Knowledge 286
6-6 CIDR Blocks 286
Section 6-6 Review 289
Test Your Knowledge 289
6-7 IPv6 Addressing 290
IPv6 CIDR 294
Section 6-7 Review 295
Test Your Knowledge 295
Summary 296
Questions and Problems 296
Critical Thinking 305
Certification Questions 306
CHAPTER 7 Introduction to Switch Configuration 310
Chapter Outline 311
Objectives 311
Key Terms 311
7-1 Introduction 312
7-2 Introduction to VLANs 313
Virtual LANs 313
Section 7-2 Review 315
Test Your Knowledge 315
7-3 Introduction to Switch Configuration 316
Hostname 316
Enable Secret 317
Setting the Line Console Passwords 317
Static VLAN Configuration 319
Networking Challenge: Switch Configuration 323
Section 7-3 Review 323
Test Your Knowledge 324
7-4 Spanning-Tree Protocol 324
Section 7-4 Review 326
Test Your Knowledge 327
7-5 Network Management 327
Configuring SNMP 328
Section 7-5 Review 331
Test Your Knowledge 331
7-6 Power over Ethernet 332
Section 7-6 Review 334
Test Your Knowledge 335
7-7 Switch Security 335
Switch Port Security 337
STP Special Features 338
Section 7-7 Review 340
Test Your Knowledge 340
Summary 341
Questions and Problems 341
Critical Thinking 348
Certification Questions 348
CHAPTER 8 Introduction to Router Configuration 352
Chapter Outline 353
Objectives 353
Key Terms 353
8-1 Introduction 354
8-2 Router Fundamentals 355
Layer 3 Networks 356
Section 8-2 Review 362
Test Your Knowledge 362
8-3 The Router's User EXEC Mode (Router>) 363
The User EXEC Mode 363
Router Configuration Challenge: User EXEC Mode 366
Section 8-3 Review 368
Test Your Knowledge 369
8-4 The Router's Privileged EXEC Mode (Router#) 369
Hostname 371
Enable Secret 371
Setting the Line Console Passwords 372
FastEthernet Interface Configuration 373
Serial Interface Configuration 374
Router Configuration Challenge: Privileged EXEC Mode 376
Section 8-4 Review 378
Test Your Knowledge 379
Summary 380
Questions and Problems 380
Critical Thinking 385
Certification Questions 387
CHAPTER 9 Routing Protocols 390
Chapter Outline 391
Objectives 391
Key Terms 391
9-1 Introduction 392
9-2 Static Routing 393
Gateway of Last Resort 400
Configuring Static Routes 400
Networking Challenge: Static Routes 403
Section 9-2 Review 404
Test Your Knowledge 404
9-3 Dynamic Routing Protocols 405
Section 9-3 Review 406
Test Your Knowledge 407
9-4 Distance Vector Protocols 407
Section 9-4 Review 410
Test Your Knowledge 410
9-5 Configuring RIP and RIPv2 410
Configuring Routes with RIP 412
Configuring Routes with RIPv2 417
Networking Challenge: RIPv2 418
Section 9-5 Review 419
Test Your Knowledge 420
9-6 Link State Protocols 420
Section 9-6 Review 423
Test Your Knowledge 423
9-7 Configuring the Open Shortest Path First (OSPF) Routing Protocol 424
Networking Challenge: OSPF 429
Section 9-7 Review 430
Test Your Knowledge 430
9-8 Advanced Distance Vector Protocol: Configuring Enhanced Interior Gateway
Routing Protocol (EIGRP) 430
Configuring Routes with EIGRP 431
Networking Challenge: EIGRP 436
Section 9-8 Review 437
Test Your Knowledge 437
9-9 IPv6 Routing 438
IPv6 Static Routing 438
RIP for IPv6 438
OSPF for IPv6 439
EIGRP for IPv6 440
Section 9-9 Review 440
Test Your Knowledge 440
Summary 442
Questions and Problems 442
Critical Thinking 455
Certification Questions 456
CHAPTER 10 Internet Technologies: Out to the Internet 458
Chapter Outline 459
Objectives 459
Key Terms 459
10-1 Introduction 461
10-2 The Line Connection 463
Data Channels 464
Point of Presence 465
Section 10-2 Review 468
Test Your Knowledge 468
10-3 Remote Access 468
Analog Modem Technologies 469
Cable Modems 470
xDSL Modems 470
Remote Access Server 472
Section 10-3 Review 475
Test Your Knowledge 475
10-4 Metro Ethernet/Carrier Ethernet 476
Ethernet Service Types 477
Service Attributes 479
Section 10-4 Review 479
Test Your Knowledge 480
10-5 Network Services: DHCP and DNS 480
The DHCP Data Packets 482
DHCP Deployment 483
Network Services: DNS 485
Internet Domain Names 486
Section 10-5 Review 491
Test Your Knowledge 492
10-6 Internet Routing: BGP 492
Section 10-6 Review 495
Test Your Knowledge 495
10-7 Analyzing Internet Data Traffic 495
Utilization/Errors Strip Chart 497
Network Layer Matrix 497
Network Layer Host Table 498
Frame Size Distribution 498
Section 10-7 Review 499
Test Your Knowledge 500
Summary 501
Questions and Problems 501
Certification Questions 507
CHAPTER 11 Troubleshooting 510
Chapter Outline 511
Objectives 511
Key Terms 511
11-1 Introduction 512
11-2 Analyzing Computer Networks 514
Using Wireshark to Inspect Data Packets 514
Using Wireshark to Capture Packets 517
Section 11-2 Review 519
Test Your Knowledge 519
11-3 Analyzing Computer Networks: FTP Data Packets 519
Section 11-3 Review 520
Test Your Knowledge 521
11-4 Analyzing Campus Network Data Traffic 521
Section 11-4 Review 524
Test Your Knowledge 524
11-5 Troubleshooting the Router Interface 525
Section 11-5 Review 529
Test Your Knowledge 529
11-6 Troubleshooting the Switch Interface 530
Section 11-6 Review 534
Test Your Knowledge 534
11-7 Troubleshooting Fiber Optics: The OTDR 535
Section 11-7 Review 537
Test Your Knowledge 537
11-8 Troubleshooting Wireless Networks 537
Hardware Issues 537
Signal Strength Problems 538
Frequency Interference Problems 538
Load Issues 538
DHCP Issues 538
SSID Issues 538
Securing Wi-Fi Issues 538
Wireless Printer Issues 538
Wireless Router Issues 539
Extending the Wireless Range 539
Selecting Wireless Channels 539
Wireless Compatibility 539
Cable Issues 540
Switch Uptime 540
Section 11-8 Review 540
Test Your Knowledge 540
11-9 Troubleshooting IP Networks 541
Verifying Network Settings 543
Investigating IP Address Issues 543
Finding Subnet Mask Issues 544
Looking for Gateway Issues 544
Identifying Name Resolution Issues 544
Investigating DHCP Issues 545
Checking for Blocked TCP/UDP Ports 546
Section 11-9 Review 546
Test Your Knowledge 547
Summary 548
Questions and Problems 548
Certification Questions 555
CHAPTER 12 Network Security 558
Chapter Outline 559
Objectives 559
Key Terms 559
12-1 Introduction 560
12-2 Intrusion: How Attackers Gain Control of a Network 562
Social Engineering 562
Password Cracking 563
Packet Sniffing 564
Vulnerable Software 566
Preventing Vulnerable Software Attacks 567
Viruses and Worms 569
Section 12-2 Review 570
Test Your Knowledge 571
12-3 Denial of Service 571
Distributed Denial of Service Attacks 574
Section 12-3 Review 574
Test Your Knowledge 574
12-4 Security Software and Hardware 575
Antivirus Software 575
Personal Firewalls 575
Configuring Firewall Settings for Windows 10 576
Configuring Firewall Settings for Mac OS X 580
Configuring Firewall Settings for Linux 581
Firewalls 582
Other Security Appliances 584
Computer Forensics 585
Section 12-4 Review 586
Test Your Knowledge 587
12-5 Managing Network Access 587
Section 12-5 Review 589
Test Your Knowledge 589
12-6 Introduction to Virtual Private Networks 590
VPN Tunneling Protocols 591
Configuring a Remote Access VPN Server 593
Configuring a Remote Client's VPN Connection 593
Windows 10/8/7 VPN Client 593
Mac OS X VPN Client 594
Cisco VPN Client 595
Section 12-6 Review 599
Test Your Knowledge 599
12-7 Wireless Security 600
Section 12-7 Review 604
Test Your Knowledge 604
Summary 605
Questions and Problems 605
Critical Thinking 610
Certification Questions 611
CHAPTER 13 Cloud Computing and Virtualization 614
Chapter Outline 615
Objectives 615
Key Terms 615
13-1 Introduction 616
13-2 Virtualization 617
Setting Up Virtualization on Windows 8 or 10 620
Section 13-2 Review 628
Test Your Knowledge 628
13-3 Cloud Computing 629
Infrastructure as a Service (IaaS) 631
Platform as a Service (PaaS) 632
Software as a Service (SaaS) 632
Cloud Infrastructures 632
Section 13-3 Review 633
Test Your Knowledge 634
13-4 Enterprise Storage 634
Section 13-4 Review 635
Test Your Knowledge 635
Summary 637
Questions and Problems 637
Certification Questions 640
CHAPTER 14 Codes and Standards 642
Chapter Outline 643
Objectives 643
Key Terms 643
14-1 Introduction 644
14-2 Safety Standards and Codes 645
Design and Construction Requirements for Exit Routes (29 CFR 1910.36) 645
Maintenance, Safeguards, and Operational Features for Exit Routes (29 CFR 1910.37) 646
Emergency Action Plans (29 CFR 1910.38) 647
Fire Prevention Plans (29 CFR 1910.39) 647
Portable Fire Extinguishers (29 CFR 1910.157) 648
Fixed Extinguishing Systems (29 CFR 1910.160) 648
Fire Detection Systems (29 CFR 1910.164) 650
Employee Alarm Systems (29 CFR 1910.165) 650
Hazard Community



We've made every effort to ensure the accuracy of this book and its companion content. Any errors that have been confirmed since this book was published can be downloaded below.

Download the errata (47 KB .doc)

Submit Errata

More Information

Pearson IT Certification Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Pearson IT Certification and its family of brands. I can unsubscribe at any time.


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about Pearson IT Certification products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information

To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.


Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites; develop new products and services; conduct educational research; and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.


If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information

Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.


This site is not directed to children under the age of 13.


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information

If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.


Users can always make an informed choice as to whether they should proceed with certain services offered by Adobe Press. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.pearsonitcertification.com/u.aspx.

Sale of Personal Information

Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents

California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure

Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact

Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice

We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020