larger cover

Add To My Wish List

Register your product to gain access to bonus material or receive a coupon.

Cisco Certified Support Technician (CCST) Cybersecurity 100-160 Official Cert Guide

Best Value Purchase

Book + eBook Bundle

  • Your Price: $60.99
  • List Price: $109.98
  • About Premium Edition eBooks
  • The Premium Edition eBook and Practice Test is a digital-only certification preparation product combining an eBook with enhanced Pearson Test Prep practice tests.

    Your purchase will deliver:

    • Link to download the Pearson Test Prep exam engine
    • Access code for question database
    • eBook in the following formats, accessible from your Account page after purchase:

    EPUB The open industry format known for its reflowable content and usability on supported mobile devices.

    PDF The popular standard, which reproduces the look and layout of the printed page.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

    eBook FAQ

    eBook Download Instructions

Individual Purchases

Book

  • Your Price: $39.99
  • List Price: $49.99
  • Usually ships in 24 hours.

Premium Edition eBook

  • Your Price: $47.99
  • List Price: $59.99
  • About Premium Edition eBooks
  • The Premium Edition eBook and Practice Test is a digital-only certification preparation product combining an eBook with enhanced Pearson Test Prep practice tests.

    Your purchase will deliver:

    • Link to download the Pearson Test Prep exam engine
    • Access code for question database
    • eBook in the following formats, accessible from your Account page after purchase:

    EPUB The open industry format known for its reflowable content and usability on supported mobile devices.

    PDF The popular standard, which reproduces the look and layout of the printed page.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

    eBook FAQ

    eBook Download Instructions

  • Copyright 2024
  • Dimensions: 7-3/8" x 9-1/8"
  • Pages: 384
  • Edition: 1st
  • Book
  • ISBN-10: 0-13-820392-X
  • ISBN-13: 978-0-13-820392-4

Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for the CCST Cybersecurity 100-160 exam. Well regarded for its level of detail, study plans, assessment features, and challenging review questions and exercises, Cisco Certified Support Technician (CCST) Cybersecurity 100-160 Official Cert Guide helps you master the concepts and techniques that ensure your exam success and is the only self-study resource approved by Cisco. Leading Cisco technology experts Shane Sexton and Raymond Lacoste share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills.

This complete study package includes

  • A test-preparation routine proven to help you pass the exam
  • Do I Know This Already? quizzes, which allow you to decide how much time you need to spend on each section
  • Exam Topic lists that make referencing easy
  • Chapter-ending exercises, which help you drill on key concepts you must know thoroughly
  • The powerful Pearson Test Prep Practice Test software, complete with hundreds of well-reviewed, exam-realistic questions, customization options, and detailed performance reports
  • An online Flash Cards application to help you drill on Key Terms by chapter
  • A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies
  • Study plan suggestions and templates to help you organize and optimize your study time

Content Update Program:

This Cert Guide includes coverage of all the topics on the Cisco Certified Support Technician CCST Cybersecurity exam from the original exam blueprint. Visit ciscopress.com/newcerts for information on any digital updates for this book that align with Cisco exam blueprint version changes

The Cisco Certified Support Technician (CCST) Cybersecurity 100-160 Official Cert Guide walks you through all the exam topics found in the Cisco CCST exam. Topics covered include

  • Essential Security Principles
  • Basic Network Security Concepts
  • Endpoint Security Concepts
  • Vulnerability Assessment and Risk Management
  • Incident Handling

Companion Website

The companion website contains more than 200 unique practice exam questions.

Pearson Test Prep online system requirements:

Browsers: Chrome version 73 and above, Safari version 12 and above, Microsoft Edge 44 and above.

Devices: Desktop and laptop computers, tablets running on Android v8.0 and above and iOS v13 and above, smartphones with a minimum screen size of 4.7. Internet access required.

Pearson Test Prep offline system requirements:

Windows 11, Windows 10, Windows 8.1; Microsoft .NET Framework 4.5 Client; Pentium-class 1 GHz processor (or equivalent); 512 MB RAM; 650 MB disk space plus 50 MB for each downloaded practice exam; access to the Internet to register and download exam databases

Also available from Cisco Press for CCST study is the Cisco Certified Support Technician (CCST) Cybersecurity 100-160 Official Cert Guide Premium Edition and Practice Test. This digital-only certification preparation product combines an eBook with an enhanced Pearson Test Prep Practice Test.

This integrated learning package

  • Enables you to focus on individual topic areas or take complete, timed exams
  • Includes direct links from each question to detailed tutorials to help you understand the concepts behind the questions
  • Provides unique sets of exam-realistic practice questions
  • Tracks your performance and provides feedback on a module-by-module basis, laying out a complete assessment of your knowledge to help you focus your study where it is needed most

Cisco Certified Support Technician (CCST) Cybersecurity 100-160 Official Cert Guide Premium Edition eBook and Practice Test

The exciting new Cisco Certified Support Technician (CCST) Cybersecurity 100-160 Official Cert Guide Premium Edition eBook and Practice Test is a digital-only certification preparation product combining an eBook with enhanced Pearson IT Certification Practice Test. The Premium Edition eBook and Practice Test contains the following items:

  • The Cisco Certified Support Technician (CCST) Cybersecurity Premium Edition Practice Test, including four practice exams and enhanced practice test features
  • PDF and EPUB formats of the Cisco Certified Support Technician (CCST) Cybersecurity 100-160 Official Cert Guide from Cisco Press, which are accessible via your PC, tablet, and smartphone

About the Premium Edition Practice Test

This Premium Edition contains an enhanced version of the Pearson Test Prep practice test software with four full practice exams. In addition, it contains all the chapter-opening assessment questions from the book. This integrated learning package

  • Enables you to focus on individual topic areas or take complete, timed exams
  • Includes direct links from each question to detailed tutorials to help you understand the concepts behind the questions
  • Provides unique sets of exam-realistic practice questions
  • Tracks your performance and provides feedback on a module-by-module basis, laying out a complete assessment of your knowledge to help you focus your study where it is needed most

Pearson Test Prep online system requirements:

Browsers: Chrome version 73 and above; Safari version 12 and above; Microsoft Edge 44 and above.

Devices: Desktop and laptop computers, tablets running on Android v8.0 and iOS v13, smartphones with a minimum screen size of 4.7. Internet access required.

Pearson Test Prep offline system requirements:

Windows 11, Windows 10, Windows 8.1; Microsoft .NET Framework 4.5 Client; Pentium-class 1 GHz processor (or equivalent); 512 MB RAM; 650 MB disk space plus 50 MB for each downloaded practice exam; access to the Internet to register and download exam databases

Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for the CCST Cybersecurity 100-160 exam. Well regarded for its level of detail, study plans, assessment features, and challenging review questions and exercises, Cisco Certified Support Technician (CCST) Cybersecurity 100-160 Official Cert Guide helps you master the concepts and techniques that ensure your exam success and is the only self-study resource approved by Cisco. Leading Cisco technology experts Shane Sexton and Raymond Lacoste share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills.

This complete study package includes

  • A test-preparation routine proven to help you pass the exam
  • Do I Know This Already? quizzes, which allow you to decide how much time you need to spend on each section
  • Exam Topic lists that make referencing easy
  • Chapter-ending exercises, which help you drill on key concepts you must know thoroughly
  • The powerful Pearson Test Prep Practice Test software, complete with hundreds of well-reviewed, exam-realistic questions, customization options, and detailed performance reports
  • An online Flash Cards application to help you drill on Key Terms by chapter
  • A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies
  • Study plan suggestions and templates to help you organize and optimize your study time

Content Update Program:

This Cert Guide includes coverage of all the topics on the Cisco Certified Support Technician CCST Cybersecurity exam from the original exam blueprint. Visit ciscopress.com/newcerts for information on any digital updates for this book that align with Cisco exam blueprint version changes

The Cisco Certified Support Technician (CCST) Cybersecurity 100-160 Official Cert Guide walks you through all the exam topics found in the Cisco CCST exam. Topics covered include

  • Essential Security Principles
  • Basic Network Security Concepts
  • Endpoint Security Concepts
  • Vulnerability Assessment and Risk Management
  • Incident Handling

Sample Pages

Download the sample pages (includes Chapter 3)

Table of Contents

Introduction xxv
Part I Introduction to Cybersecurity
Chapter 1
Security Principles 2
Do I Know This Already? Quiz 2
Foundation Topics 4
The CIA Triad 4
Common Security Terms 5
Types of Attackers and Their Reasons for Attacks 7
Code of Ethics 9
Summary 10
Exam Preparation Tasks 11
Review All Key Topics 12
Define Key Terms 12
Complete Tables and Lists from Memory 12
Review Questions 12
Chapter 2 Common Threats, Attacks, and Vulnerabilities 14
Do I Know This Already? Quiz 15
Foundation Topics 16
Malware Variants 16
IoT Vulnerabilities 19
Distributed Denial of Service 19
On-Path Attacks 21
Insider Threats 23
Social Engineering Tactics 25
Phishing 26
Spear Phishing 26
Whaling 26
Vishing 26
Smishing 27
Piggybacking/Tailgating 27
Malvertising 27
Physical Attacks 27
Advanced Persistent Threats (APTs) 28
Summary 29
Exam Preparation Tasks 31
Review All Key Topics 31
Define Key Terms 31
Complete Tables and Lists from Memory 32
Review Questions 32
Chapter 3 Access Management 34
Do I Know This Already? Quiz 34
Foundation Topics 36
Introduction to AAA 36
Authentication 36
Multifactor Authentication (MFA) 37
Passwords and Password Policies 39
Authorization 41
Accounting 41
RADIUS 42
Summary 44
Exam Preparation Tasks 45
Review All Key Topics 45
Define Key Terms 45
Complete Tables and Lists from Memory 46
Review Questions 46
Chapter 4 Cryptography 48
Do I Know This Already? Quiz 49
Foundation Topics 51
Cryptography Overview 51
Encryption and Decryption 51
States of Data 52
Symmetric Cryptography 52
Asymmetric Cryptography 53
Confidentiality with Asymmetric Cryptography 53
Authentication with Asymmetric Cryptography 54
Combining Confidentiality and Authentication with Asymmetric Cryptography 54
Using Symmetric and Asymmetric Cryptography 55
Types of Ciphers 56
Symmetric Ciphers 56
Types of Asymmetric Algorithms 57
Certificates and PKI 58
SCEP 62
Digital Certificates 62
Lifetime of a Digital Certificate 63
PKI Infrastructure 65
Hashing 66
Shared Secret Keys and Salting with Hashing 68
Cryptography in the Real World 69
Web Browsing 69
VPNs 70
Remote Management 70
Cisco Next-Generation Cryptography 70
Summary 71
Exam Preparation Tasks 72
Review All Key Topics 72
Complete Tables and Lists from Memory 73
Define Key Terms 73
Review Questions 73
Part II Network Security
Chapter 5
Introduction to Networking, Addressing, and TCP/IP Protocols 76
Do I Know This Already? Quiz 76
Foundation Topics 78
The TCP/IP Stack 78
Common TCP/IP Protocols and Their Vulnerabilities 81
Transmission Control Protocol (TCP) 81
User Datagram Protocol (UDP) 81
Internet Protocol Version 4 (IPv4) 82
Internet Protocol Version 6 (IPv6) 83
Media Access Control (MAC) 83
Address Resolution Protocol (ARP) 84
Hypertext Transfer Protocol (HTTP) 84
Internet Control Message Protocol (ICMP) 85
Dynamic Host Configuration Protocol (DHCP) 85
Domain Name System (DNS) 86
File Transfer Protocol (FTP) 86
Telnet 87
Secure Shell (SSH) 87
Network Addressing and Its Impact on Security 88
IPv4 and IPv6 88
CIDR Notation 89
Network Segmentation 89
Public Versus Private Networks 90
NAT 92
MAC Addressing 94
Summary 94
Exam Preparation Tasks 97
Review All Key Topics 97
Complete Tables and Lists from Memory 98
Define Key Terms 98
Review Questions 98
Chapter 6 Network Infrastructure 100
Do I Know This Already? Quiz 101
Foundation Topics 102
The Network Security Architecture 102
Screened Subnets, Virtualization, and the Cloud 103
Screened Subnet (DMZ) 103
Virtualization 105
Cloud 106
Proxy Servers 107
Forward Proxy 108
Reverse Proxy 109
Cisco WSA 111
Honeypots 112
Intrusion Detection/Prevention Systems 113
Intrusion Detection Systems (IDSs) 113
Intrusion Prevention Systems (IPSs) 113
Network-Based and Host-Based IDSs/IPSs 113
Signature-Based and Behavioral-Based Detection 113
Summary 114
Exam Preparation Tasks 115
Review All Key Topics 115
Complete Tables and Lists from Memory 116
Define Key Terms 116
Review Questions 116
Chapter 7 Controlling Network Access 118
Do I Know This Already? Quiz 118
Foundation Topics 120
Virtual Private Networks 120
Site-to-Site 121
Remote-Access 122
IPsec 124
Firewalls 125
NGFW 127
Cisco Firepower Next-Generation Firewall (NGFW) 128
Access Control Lists 129
Key Aspects and Uses of Access Control Lists 129
ACL Entries 130
Standard and Extended ACLs 132
Standard ACL 132
Extended ACL 133
ACL Evaluation 133
Network Access Control 134
Summary 137
Exam Preparation Tasks 138
Review All Key Topics 138
Complete Tables and Lists from Memory 139
Define Key Terms 139
Review Questions 139
Chapter 8 Wireless SOHO Security 142
Do I Know This Already? Quiz 143
Foundation Topics 144
Hardening Wireless Routers and Access Points 144
Administrative Interface 144
Updates 145
Wireless Encryption Standards 146
WEP 146
WPA 146
WPA2 146
WPA3 147
Wireless Authentication 148
Personal Mode 148
Enterprise Mode 149
WPA3 Enhanced Open 150
Wi-Fi Protected Setup, SSIDs, and MAC Address Filtering 150
Wi-Fi Protected Setup 151
SSID 151
MAC Address Filtering 152
Common Wireless Network Threats and Attacks 152
Rogue Access Points and Evil Twins 152
War Driving 154
Wireless Password Cracking 154
Protecting Yourself from Wireless Attacks 155
Summary 155
Exam Preparation Tasks 157
Review All Key Topics 157
Complete Tables and Lists from Memory 158
Define Key Terms 158
Review Questions 158
Part III Endpoint Security
Chapter 9
Operating Systems and Tools 160
Do I Know This Already? Quiz 160
Foundation Topics 163
Host Security Features 163
Windows 164
Microsoft Defender 165
Virus & Threat Protection 165
Firewall & Network Protection 166
App & Browser Control 167
CMD and PowerShell 169
NTFS Permissions 170
BitLocker 172
Windows Updates 173
Event Viewer and Audit Logs 173
Linux 175
firewalld and UFW 175
Bash 176
Linux Permissions 178
SELinux and AppArmor 179
SELinux 179
AppArmor 180
dm-crypt and LUKS 180
Updates: yum, dnf, and apt 180
Linux Logs 181
macOS 183
Firewall 183
Zsh 184
APFS Permissions 184
FileVault 185
Updates 185
macOS Logs: Console 186
Tools 186
netstat and ss 186
nslookup and dig 187
nslookup 187
dig 188
tcpdump and Wireshark 188
tcpdump 188
Wireshark 189
syslog 190
Summary 191
Exam Preparation Tasks 192
Review All Key Topics 192
Complete Tables and Lists from Memory 192
Define Key Terms 193
Review Questions 193
Chapter 10 Endpoint Policies and Standards 196
Do I Know This Already? Quiz 196
Foundation Topics 198
Asset Management 198
Program Deployment 199
Backups 199
Local and Remote Backups 200
Full, Differential, and Incremental Backups 200
Bring Your Own Device (BYOD) 201
Pros and Cons of BYOD 202
Device and Configuration Management 202
Data Encryption 204
App Distribution 205
Regulatory Compliance 205
PCI-DSS 205
HIPAA 206
GDPR 206
Summary 207
Exam Preparation Tasks 207
Review All Key Topics 207
Complete Tables and Lists from Memory 208
Define Key Terms 208
Review Questions 208
Chapter 11 Network and Endpoint Malware Detection and Remediation 210
Do I Know This Already? Quiz 210
Foundation Topics 211
Monitoring and Detection 211
Signature Types 212
Scanning Systems 214
Cisco AMP 215
Reviewing Logs 216
Malware Remediation Best Practices 218
Summary 218
Exam Preparation Tasks 220
Review All Key Topics 220
Complete Tables and Lists from Memory 220
Define Key Terms 220
Review Questions 221
Chapter 12 Risk and Vulnerability Management 222
Do I Know This Already? Quiz 222
Foundation Topics 223
The Vocabulary of Risk 223
Vulnerabilities 224
The Vulnerability Management Lifecycle 225
Active and Passive Scanning 228
Port Scanning 229
Risk 229
Risk Prioritization 230
Risk Ranks and Levels 230
Data Types and Classification 231
Security Assessments 233
Risk Management 234
Risk Management Strategies 234
Summary 237
Exam Preparation Tasks 238
Review All Key Topics 238
Complete Tables and Lists from Memory 238
Define Key Terms 238
Review Questions 238
Chapter 13 Threat Intelligence 240
Do I Know This Already? Quiz 240
Foundation Topics 242
Threat Intelligence 242
Vulnerabilities Databases and Feeds 242
Pros and Cons of Vulnerability Databases 243
CVE and CVSS 244
Vulnerability Scanning and Assessment Tools 245
Additional Sources of Threat Intelligence 245
Reports and News 245
Reports 246
News 247
Collective, Ad Hoc, and Automated Intelligence 247
STIX and TAXII 248
STIX 248
TAXII 250
How and Why to Proactively Share Threat Intelligence 250
Summary 251
Exam Preparation Tasks 252
Review All Key Topics 252
Complete Tables and Lists from Memory 252
Define Key Terms 252
Review Questions 253
Chapter 14 Disaster Recovery and Business Continuity 254
Do I Know This Already? Quiz 254
Foundation Topics 256
Disaster Recovery Plans 256
Disasters 256
Disaster Recovery Controls 258
Backups 259
Business Impact Analyses (BIAs) 261
Recovery Time Objectives 262
Recovery Point Objectives 262
Business Continuity Plans 262
Disaster Recovery Versus Business Continuity 263
Summary 264
Exam Preparation Tasks 265
Review All Key Topics 265
Complete Tables and Lists from Memory 266
Define Key Terms 266
Review Questions 266
Chapter 15 Incident Handling 268
Do I Know This Already? Quiz 268
Foundation Topics 270
Events and Incidents 270
Incident Response 270
Preparation 270
Team 271
Tools 271
Training and SOPs 272
Reporting and Notification Requirements 272
Detection and Analysis 273
Containment, Eradication, and Recovery 274
Post-Incident Activities 274
Digital Forensics and Incident Response 275
Attack Frameworks and Concepts 275
Lockheed Martin Cyber Kill Chain 275
MITRE ATT&CK 276
Diamond Model of Intrusion Analysis 276
Tactics, Techniques, and Procedures 277
Evidence and Artifacts 278
Sources and Volatility 278
Preservation and Chain of Custody 279
Compliance Frameworks 280
GDPR 280
HIPAA 280
PCI-DSS 280
FERPA 280
FISMA 281
Comparing Regulatory Frameworks 281
Summary 281
Exam Preparation Tasks 282
Review All Key Topics 282
Complete Tables and Lists from Memory 283
Define Key Terms 283
Review Questions 283
Part IV CCST Cybersecurity Preparation
Chapter 16
Final Preparation 286
Tools and Resources 286
Study Tips 287
Summary 287
Chapter 17 Cisco Certified Support Technician (CCST) Cybersecurity 100-160 Official Cert Guide Exam Updates 288
The Purpose of This Chapter 288
About Possible Exam Updates 289
Impact on You and Your Study Plan 289
News About the Next Exam Release 290
Updated Technical Content 290
Appendix A Answers to the Do I Know This Already? Quizzes and Review Questions 292
Glossary 307

Online Elements
Appendix B Memory Tables
Appendix C Memory Tables Answer Key
Appendix D Study Planner
Glossary


9780138203924 TOC 1/19/2024

Errata

We've made every effort to ensure the accuracy of this book and its companion content. Any errors that have been confirmed since this book was published can be downloaded below.

Download the errata (141 KB .doc)

Submit Errata

Cisco Press Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Cisco Press and its family of brands. I can unsubscribe at any time.

Overview

Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about Cisco Press products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information

To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites; develop new products and services; conduct educational research; and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@ciscopress.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information

Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security

Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children

This site is not directed to children under the age of 13.

Marketing

Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information

If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out

Users can always make an informed choice as to whether they should proceed with certain services offered by Cisco Press. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.ciscopress.com/u.aspx.

Sale of Personal Information

Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents

California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure

Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links

This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact

Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice

We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020


Other Things You Might Like

In Zero Trust We Trust
By Avinash Naduvath
eBook (Watermarked)   $24.47