larger cover

Add To My Wish List

Register your product to gain access to bonus material or receive a coupon.

CCSP SNPA Official Exam Certification Guide, 3rd Edition

Book

  • Sorry, this book is no longer in print.
Not for Sale
  • Description
  • Sample Content
  • Updates
  • Copyright 2006
  • Edition: 3rd
  • Book
  • ISBN-10: 1-58720-152-6
  • ISBN-13: 978-1-58720-152-3

Assessment, review, and practice for CCSP SNPA exam 642-522

The official study guide helps you master all the topics on the SNPA exam, including:

  • Firewall technologies
  • Cisco Security Appliance translation and connection
  • Access control configuration
  • Modular policy framework
  • Security contexts
  • Syslog
  • Routing protocol support
  • Failover
  • Virtual private networks (VPN)
  • Adaptive Security Device Manager (ASDM)
  • Content filtering
  • Authentication, authorization, and accounting (AAA) configuration
  • Intrusion Prevention Systems (IPS) and advanced protocol handling

CCSP SNPA Official Exam Certification Guide, Third Edition, is a best-of-breed Cisco® exam study guide that focuses specifically on the objectives for the Securing Networks with PIX and ASA (SNPA) exam. Network security consultant, Michael Gibbs, shares preparation hints and test-taking tips, helping you identify areas of weakness and improve your knowledge of firewall and Adaptive Security Appliance (ASA) security. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics.

This guide presents you with an organized test preparation routine through the use of proven series elements and techniques. “Do I Know This Already?” quizzes open each chapter and allow you to decide how much time you need to spend on each section. Exam topic lists and Foundation Summary tables make referencing easy and give you a quick refresher whenever you need it. Challenging chapter-ending review questions help you assess your knowledge and reinforce key concepts.

The companion CD-ROM contains a powerful testing engine that allows you to focus on individual topic areas or take complete, timed exams. The assessment engine also tracks your performance and provides feedback on a module-by-module basis, presenting question-by-question remediation to the text.

Well-regarded for its level of detail, assessment features, and challenging review questions and exercises, this book helps you master the concepts and techniques that will enable you to succeed on the exam the first time.

CCSP SNPA Official Exam Certification Guide, Third Edition, is part of a recommended learning path from Cisco Systems® that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, visit www.cisco.com/go/authorizedtraining.

Companion CD-ROM

The CD-ROM contains an electronic copy of the book and more than 200 practice questions for the SNPA exam, all available in study mode, test mode, and flash card format.

This volume is part of the Exam Certification Guide Series from Cisco Press®. Books in this series provide officially developed exam preparation materials that offer assessment, review, and practice to help Cisco Career Certification candidates identify weaknesses, concentrate their study efforts, and enhance their confidence as exam day nears.

Downloadable Sample Chapter

Download - 790 KB -- Chapter 6: Getting Started with the Cisco Security Appliance Family of Firewalls

Table of Contents

Chapter 1       Network Security

           How to Best Use This Chapter

           “Do I Know This Already?” Quiz

           Foundation and Supplemental Topics

           Overview of Network Security

           Vulnerabilities, Threats, and Attacks

                     Vulnerabilities

                     Threats

                     Types of Attacks

           Security Policies

                     Step 1: Secure

                     Step 2: Monitor

                     Step 3: Test

                     Step 4: Improve

           Network Security as a “Legal Issue”

           Defense in Depth

           Cisco AVVID and Cisco SAFE

                     Cisco AVVID?

                     Cisco SAFE

           Foundation Summary

                     Network Security

                     Vulnerabilities, Threats, and Attacks

                     Vulnerabilities

                     Threats

                     Attacks

                     Security Policies

                     Network Security as a Process

                     Defense in Depth

                     Cisco AVVID

                     Cisco SAFE

                     Key Terms

           Q&A

Chapter 2       Firewall Technologies and‡the‡Cisco Security Appliance

            How to Best Use This Chapter

           “Do I Know This Already?” Quiz

           Foundation Topics

           Firewall Technologies

                     Packet Filtering

                     Proxy

                     Stateful Packet Inspection

           Cisco PIX Firewall

                     Secure Real-Time Embedded System

                     Adaptive Security Algorithm

                   Cut-Through Proxy

                     Security Contexts (Virtual Firewall)

                     Redundancy

           Foundation Summary

                     Firewall Technologies

                     Cisco Security Appliance

           Q&A

Chapter 3       Cisco Security Appliance

           How to Best Use This Chapter

           “Do I Know This Already?” Quiz

           Foundation Topics

           Overview of the Cisco Security Appliance

                     ASA

                     Cut-Through Proxy

           Cisco PIX Firewall Models and Features

                     Intrusion Protection

                     AAA Support

                     X.509 Certificate Support

                     Modular Policy Framework

                     Network Address Translation/Port Address Translation

                     Firewall Management

                     Simple Network Management Protocol

                     Syslog Support

                     Security Contexts

                     Transparent Firewalls

                     Virtual Private Networks

                     Optional Firewall Components

           PIX Firewall Model Capabilities

                     Cisco PIX 501

                     Cisco PIX 506E

                     Cisco PIX 515E

                     Cisco PIX 525

                     Cisco PIX 535

           Cisco ASA Security Model Capabilities

                     Cisco ASA 5510 Security Appliance

                     Cisco ASA 5520 Security Appliance

                     Cisco ASA 5540 Security Appliance

           Foundation Summary

                     Adaptive Security Algorithm

                     Cut-Through Proxy

                     Cisco PIX Firewall Models and Features

                     Cisco ASA Security Appliance Models and Features

                     Intrusion Protection

                     AAA Support

                     X.509 Certificate Support

                     Modular Policy Framework

                     NAT/PAT

                     Firewall Management

                     SNMP

                     Syslog Support

                     Virtual Private Networks

                     Security Context

                     Cisco Security Appliance Models

           Q&A

Chapter 4       System Management/Maintenance

           How to Best Use This Chapter

           “Do I Know This Already?” Quiz

           Foundation Topics

           Accessing Cisco Security Appliance

                     Accessing a Cisco Security Appliance with Telnet

                     Accessing the Cisco Security Appliance with Secure Shell

           Command-Level Authorization

           Installing a New Operating System

                     Upgrading Your Activation Key

           Upgrading the Cisco Security Appliance Operating System

           Upgrading the Operating System Using the copy tftp flash‡Command

                     Upgrading the Operating System Using Monitor Mode

                     Upgrading the OS Using an HTTP Client

           Creating a Boothelper Disk Using a Windows PC

           Password Recovery

                     Cisco PIX Firewall Password Recovery: Getting Started

                     Password Recovery Procedure for a PIX Firewall with a Floppy Drive (PIX‡520)

                     Password Recovery Procedure for a Diskless PIX Firewall
(PIX 501, 506, 506E, 515E, 515, 525, and 535)

                           Password Recovery Procedure for the ASA Security Appliance

           Overview of Simple Network Management Protocol
on the PIX Firewall

           Configuring Simple Network Management Protocol
on Security Appliance

           Troubleshooting Commands

           Foundation Summary

           Q&A

Chapter 5       Understanding Cisco Security Appliance Translation and Connection

           How to Best Use This Chapter

           “Do I Know This Already?” Quiz

           Foundation Topics

           How the Cisco Security Appliance Handles Traffic

                     Interface Security Levels and the Default Security Policy

                     Transport Protocols

           Address Translation

                     Translation Commands

                     NAT

                     PAT

                     Static Translation

                     Using the static Command for Port Redirection

                     Configuring Multiple Translation Types on the Cisco Security Appliance

                     Bidirectional NAT

           Translation Versus Connection

           Configuring DNS Support

           Foundation Summary

           Q&A

Chapter 6       Getting Started with the Cisco Security Appliance Family of Firewalls

           How to Best Use This Chapter

           “Do I Know This Already?” Quiz

           Foundation Topics

           Access Modes

           Configuring a Cisco Security Appliance

                     interface Command

                     security-level Command

                     nameif Command

                     ip address Command

                     nat Command

                     speed Command

                     duplex Command

                     nat-control Command

                     global Command

                     route Command

                     Routing Information Protocol

                     Testing Your Configuration

                     Saving Your Configuration

           Support for Domain Name System Messages

           Configuring Dynamic Host Configuration Protocol on the Cisco Security Appliance

                     Using the Cisco Security Appliance DHCP Server

                     Configuring the Security Appliance DHCP Client

           Configuring Time Settings on the Cisco Security Appliance

NTP

                     Cisco Security Appliance System Clock

           Configuring Login Banners on the Cisco Security Appliance

           Configuring Transparent Mode

                     Enabling Transparent Mode

                     Traffic Management in Transparent Mode

                     Monitoring in Transparent Mode

           Sample Security Appliance Configuration

           Foundation Summary

           Q&A

Chapter 7       Configuring Access

           How Best to Use This Chapter

           “Do I Know This Already?” Quiz

           Foundation Topics

           Configuring Inbound Access Through a Cisco Security Appliance

                     Static NAT

                     Static PAT

                     TCP Intercept Feature

                     nat 0 Command

                     Policy NAT

                     Access Lists

           Object Grouping

                     network Object Type

                     protocol Object Type

                     service Object Type

                     icmp-type Object Type

                     Nesting Object Groups

                     ACL Logging

           Advanced Protocol Handling

                     FTP

                     DNS

                     Simple Mail Transfer Protocol

           Foundation Summary

           Q&A

Chapter 8       Modular Policy Framework

           How to Best Use This Chapter

           “Do I Know This Already?” Quiz

           Foundation Topics

           Modular Policy Framework Overview

           Traffic Flow Matching

                     Step 1: Create a Class Map

                     Step 2: Define Class Map Matches

                     Viewing the Class Map Configuration

           Assigning Actions to a Traffic Class

                     Step 1: Create a Policy Map

                     Step 2: Assign Traffic Classes to the Policy Map

                     Step 3: Assign Policies for Each Class

           Viewing the Policy Map Configuration

           Assigning Policies to an Interface

                     Service Policy Matching Logic

                     Viewing the Service Policy Configuration

                     Viewing the Service Policy Statistics

           Foundation Summary

           Q&A

Chapter 9       Security Contexts

           How to Best Use This Chapter

           “Do I Know This Already?” Quiz

           Foundation Topics

           Security Context Overview

                     Multiple Context Modes

                     Administration Context

           Configuring Security Contexts

                     Creating a New Context

                     Assigning Interfaces to a Context

                     Uploading a Configuration Using the config-url Command

           Managing Security Contexts

                     Deleting Contexts

                     Navigating Multiple Contexts

                     Viewing Context Information

           Step-by-Step Configuration of a Security Context

           Foundation Summary

           Q&A

Chapter 10     Syslog and the Cisco Security Appliance

           How to Best Use This Chapter

           “Do I Know This Already?” Quiz

           Foundation Topics

           How Syslog Works

                     Logging Facilities

                     Logging Levels

                     How Log Messages Are Organized

                     How to Read System Log Messages

           Configuring Syslog on a Cisco Security Appliance

           Configuring the ASDM to View Logging

                     Configuring Syslog Messages at the Console

                     Sending Syslog Messages to a Telnet Session

                     Configuring the Cisco Security Appliance to Send Syslog Messages to a Log Server

                     Configuring SNMP Traps and SNMP Requests

           Configuring a Syslogd Server

                     PIX Firewall Syslog Server

           Foundation Summary

           Q&A

Chapter 11     Routing and the Cisco Security Appliance

           How to Best Use This Chapter

           “Do I Know This Already?” Quiz

           Foundation Topics and Supplemental Topics

           General Routing Principles

           Ethernet VLAN Tagging

                     Understanding VLANs

                     Understanding Trunk Ports

                     Understanding Logical Interfaces

                     Managing VLANs

           IP Routing

                     Static Routes

                     Dynamic Routes

           Multicast Routing

     Multicast Commands

     Inbound Multicast Traffic

     Outbound Multicast Traffic

     Debugging Multicast

           Foundation Summary

           Q&A

Chapter 12     Cisco Security Appliance Failover

           How to Best Use This Chapter

           “Do I Know This Already?” Quiz

           Foundation Topics

           What Causes a Failover Event?

           What Is Required for a Failover Configuration?

           Failover Monitoring

           Configuration Replication

           Stateful Failover

           LAN-Based Failover

           Active-Active Failover

           Configuring Failover

           Foundation Summary

           Q&A

Chapter 13     Virtual Private Networks

           How to Best Use This Chapter

           “Do I Know This Already?” Quiz

           Foundation Topics

           Overview of Virtual Private Network Technologies

                     Internet Protocol Security

                     Internet Key Exchange

                     Perfect Forward Secrecy

                     Certification Authorities

           Overview of WebVPN

                     WebVPN Portal Interface

                     Port Forwarding

           Configuring the Security Appliance as a VPN Gateway

                     Selecting the Configuration

                     Configuring IKE

                     Configuring IPSec

                     Troubleshooting the VPN Connection

           Configuring the Security Appliance as a WebVPN Gateway

                     WebVPN Global Configuration

                     Configuring URLs and File Servers

                     Configuring Port Forwarding

                     Configuring E-Mail Proxies

                     Setting Up Filters and ACLs

           Configuring Security Appliances for Scalable VPNs

           Foundation Summary

           Q&A

           Scenario

                     VPN Configurations

                     Completed PIX Configurations

                     How the Configuration Lines Interact

Chapter 14     Configuring Access VPNs

           How to Best Use This Chapter

           “Do I Know This Already?” Quiz

           Foundation and Supplemental Topics

           Introduction to Cisco Easy VPN

                     Easy VPN Server

                     Easy VPN Remote Feature

           Overview of the Easy VPN Server

                     Major Features

                     Server Functions

                     Supported Servers

           Overview of Easy VPN Remote Feature

                     Supported Clients

                     Easy VPN Remote Connection Process

                     Extended Authentication Configuration

           Easy VPN Remote Modes of Operation

                     Client Mode

                     Network Extension Mode

           Overview of Cisco VPN Software Client

                     Features

                     Specifications

                     Cisco VPN Client Manual Configuration Tasks

           Security Appliance Easy VPN Remote Configuration

                     Basic Configuration

                     Client Device Mode

                     Secure Unit Authentication

                     Individual User Authentication

           Point-to-Point Protocol over Ethernet and the Security Appliance

                     Configuring the VPDN Group

                     Configuring VPDN Group Authentication

                     Assigning the VPDN Group Username

                     Configuring the VPDN Username and Password

                     Enabling the Point-to-Point over Ethernet Client

                     Monitoring the Point-to-Point over Ethernet Client

           Dynamic Host Configuration Protocol Server Configuration

                     DHCP Overview

                     Configuring the Security Appliance DHCP Server

                     DHCP Server Auto Configuration

                     DHCP Debugging Commands

           Foundation Summary

           Q&A

Chapter 15     Adaptive Security Device Manager

           How to Best Use This Chapter

           “Do I Know This Already?” Quiz

           Foundation Topics

           ASDM Overview

           Security Appliance Requirements to Run ASDM

                     ASDM Workstation Requirement

                     ASDM Installation

                     Using ASDM to Configure the Cisco Security Appliance

                     Monitoring

           Using ASDM for VPN Configuration

                     Using ASDM to Create a Site-to-Site VPN

                     Using ASDM to Create a Remote-Access VPN

           Foundation Summary

           Q&A

Chapter 16     Content Filtering on the Cisco Security Appliance

           How to Best Use This Chapter

           “Do I Know This Already?” Quiz

           Foundation Topics

           Filtering ActiveX Objects and Java Applets

                     Filtering Java Applets

                   Filtering ActiveX Objects

           Filtering URLs

                     Identifying the URL-Filtering Server

                     Configuring URL-Filtering Policy

                     Filtering HTTPS and FTP

                     Filtering Long URLs

                     Viewing Filtering Statistics and Configuration

           Foundation Summary

           Q&A

Chapter 17     Overview of AAA and the‡Cisco Security Appliance

           How to Best Use This Chapter

           “Do I Know This Already?” Quiz

           Foundation Topics

           Overview of AAA and the Cisco Security Appliance

                     Definition of AAA

                     AAA and the Cisco Security Appliance

                     Cut-Through Proxy

                     Supported AAA Server Technologies

           Cisco Secure Access Control Server

                     Minimum Hardware and Operating System Requirements
for Cisco Secure ACS

                     Installing Cisco Secure ACS Version 3.3 on Windows Server

           Foundation Summary

           Q&A

Chapter 18     Configuration of AAA on‡the‡Cisco Security Appliance

           How to Best Use This Chapter

           “Do I Know This Already?” Quiz

           Foundation Topics

           Specifying Your AAA Servers

           Configuring AAA on the Cisco Security Appliance

                     Step 1: Identifying the AAA Server and NAS

                     Step 2: Configuring Authentication

                     Step 3: Configuring Authorization

                     Step 4: Configuring Accounting

           Cisco Secure and Cut-Through Configuration

           Configuring Downloadable Security Appliance ACLs

           Troubleshooting Your AAA Setup

     Checking the Security Appliance

     Checking the Cisco Secure ACS

           Foundation Summary

           Q&A

Chapter 19     IPS and Advanced Protocol Handling

           How To Best Use This Chapter

           “Do I Know This Already?” Quiz

           Foundation Topics

           Multimedia Support on the Cisco Security Appliance

                     RTSP

           Application Inspection Support for Voice over IP

                     CTIQBE

                     H.323

                     MGCP

                     SCCP

                     SIP

           Application Inspection

                     FTP Inspection

                     HTTP Inspection

                     Domain Name Inspection

                     Mail Inspection

                     ICMP Inspection

                     Remote Shell Inspections

                     SNMP Inspection

                     SQL*Net Inspection

           Security Appliance Intrusion Protection Feature

                     AIP-SSM Module

                     Configuring IPS Through ASDM

           Foundation Summary

           Q&A

Chapter 20     Case Study and Sample Configuration

           Remote Offices

           Firewall

           Growth Expectation

           Task 1: Basic Configuration for the Cisco Security Appliance

                     Basic Configuration Information for HQ-PIX

                     Basic Configuration Information for MN-PIX

                     Basic Configuration Information for HOU-PIX

           Task 2: Configuring Access Rules on HQ

           Task 3: Configuring Authentication

           Task 4: Configuring Logging

           Task 5: Configuring a VPN Between HQ and Remote Sites

                     Configuring the Central PIX Firewall, HQ-PIX, for VPN Tunneling

                     Configuring the Houston PIX Firewall, HOU-PIX, for VPN Tunneling

                     Configuring the Minneapolis PIX Firewall, MN-PIX, for VPN Tunneling

                     Verifying and Troubleshooting

           Task 6: Configuring a Remote-Access VPN to HQ

                     Create an IP Address Pool

                     Define a Group Policy for Mode Configuration Push

                     Enable IKE Dead Peer Detection

           Task 7: Configuring Failover

           What Is Wrong with This Picture?

           Foundation Summary

           Q&A

Appendix a    Answers to the “Do I Know This Already?” Quizzes and Q&A Sections

1587201526toc041806

Index

Download - 117 KB -- Index

Errata

Errata -- 28 KB

Submit Errata

Cisco Press Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Cisco Press and its family of brands. I can unsubscribe at any time.

Overview

Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about Cisco Press products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information

To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites; develop new products and services; conduct educational research; and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@ciscopress.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information

Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security

Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children

This site is not directed to children under the age of 13.

Marketing

Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information

If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out

Users can always make an informed choice as to whether they should proceed with certain services offered by Cisco Press. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.ciscopress.com/u.aspx.

Sale of Personal Information

Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents

California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure

Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links

This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact

Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice

We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020