larger cover

Add To My Wish List

Register your product to gain access to bonus material or receive a coupon.

CCDP Self-Study: Designing Cisco Network Architectures (ARCH)


  • Sorry, this book is no longer in print.
Not for Sale
  • Description
  • Sample Content
  • Updates
  • Copyright 2005
  • Edition: 1st
  • Book
  • ISBN-10: 1-58705-185-0
  • ISBN-13: 978-1-58705-185-2

A new edition of this title is available, ISBN-10: 1587055740 ISBN-13: 9781587055744

Cisco authorized self-study book for CCDP® 642-871 architectures foundation learning

Prepare for the CCDP ARCH exam 642-871 with the Cisco authorized self-study guide. This book teaches you how to:

  • Understand the composition and deployment of the Cisco AVVID framework in network design
  • Understand the composition and role of the Enterprise Composite Network Model in enterprise network design
  • Design enterprise campus networks and their edge network connectivity to the Internet
  • Understand and implement network management solutions in the network
  • Integrate new technologies designed to enhance network performance and availability in the enterprise, such as high availability, QoS, multicasting, and storage and content networking
  • Design and implement appropriate security solutions for enterprise networks
  • Deploy wireless technologies within the enterprise
  • Implement and design IP telephony solutions for the enterprise network

CCDP Self-Study: Designing Cisco Network Architectures (ARCH) is a Cisco® authorized self-paced learning tool. By presenting a structured format for the conceptual and intermediate design of AVVID network infrastructures, this book teaches you how to design solutions that scale from small to large enterprise networks and take advantage of the latest technologies. Whether you are preparing for the CCDP® certification or simply want to gain a better understanding of how to architect network solutions over intelligent network services to achieve effective performance, scalability, and availability, you will benefit from the foundation information presented in this book.

This comprehensive book provides detailed information and easy-to-grasp tutorials on a broad range of topics related to architecture and design, including security, fine-tuning routing protocols, switching structures, and IP multicasting. To keep pace with the Cisco technological developments and new product offerings, this study guide includes coverage of wireless networking, the SAFE Blueprint, content networking, storage networking, quality of service (QoS), IP telephony, network management, and high availability networks. Design examples and sample verification output demonstrate implementation techniques. Configuration exercises, which appear in every chapter, provide a practical review of key concepts to discuss critical issues surrounding network operation. Chapter-ending review questions illustrate and help solidify the concepts presented in this book.

CCDP Self-Study: Designing Cisco Network Architectures (ARCH) is part of a recommended learning path from Cisco Systems® that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit

This volume is in the Certification Self-Study Series offered by Cisco Press®. Books in this series provide officially developed training solutions to help networking professionals understand technology implementations and prepare for the Cisco Career Certifications examinations.


Online Sample Chapter

CCDP Self-Study: Designing High-Availability Services

Downloadable Sample Chapter

Download - 388 KB -- Chapter 5: Designing High-Availability Services

Table of Contents


1. Introducing Cisco Network Service Architectures.

    Primary Concerns of Network Deployment




    Cisco AVVID Framework

      Cisco AVVID Common Network Infrastructure

      Cisco AVVID Intelligent Network Services

      Cisco AVVID Network Solutions

    Enterprise Composite Network Model

      Enterprise Campus Functional Area

      Campus Infrastructure Module

      Network Management Module

      Server Farm Module

      Edge Distribution Module

    Effects of the Enterprise Campus Functional Area on the Enterprise Network

      Enterprise Edge Functional Area

      E-Commerce Module

      Internet Connectivity Module

      Remote Access and VPN Module

      WAN Module

    Effects of the Enterprise Edge Functional Area on the Enterprise Network

      Service Provider Edge Functional Area



      Product Summary

      Review Questions

2. Designing Enterprise Campus Networks.

    Enterprise Network Design Methodology

      Campus Design Within the Enterprise Composite Network Model

      Typical Requirements for an Enterprise Campus Network

      Enterprise Campus Design Methodology

      Analyzing Network Traffic Patterns

    Designing the Campus Infrastructure

      Designing the Logical Campus Network

      One VLAN Per Switch

      Unique VLANs Per Switch

      VLANs Spanning Multiple Access Switches

    Designing the Physical Campus Network

      Selecting Transmission Media and Data-Link Protocols

      Selecting a Physical Network Segmentation Strategy

      Selecting and Implementing Spanning Tree Protocol

    Selecting Data Link or Multilayer Switching Solutions

      Small Campus Network

      Medium Campus Network

      Multilayer Switched Campus Backbone

    Selecting Cisco Hardware and Software

    Identifying an IP Addressing Strategy

    Selecting Routing Protocols

      Static Versus Dynamic Routing

      RIP and RIPv2





    Selecting Areas for Networks

    Enterprise Campus Design Examples

      Small Enterprise Design Example

      Medium Enterprise Design Example

      Large Enterprise Design Example

    Designing the Server Farm

      Design Objectives for the Server Farm

      Server Farm Infrastructure Architecture

      Designing the Server Farm for Scalability

      Considerations for Server Farm Security and Manageability



    Product Summary

    Standards and Specifications Summary

    Review Questions

    Case Study: OCSIC Bottling Company


      Business Goals of OCSIC

      Headquarters Location, Network, and Applications

      North American Plants and Their Applications

      Networking Strategies and Goals

      Proposed Headquarters Campus Network Solution

      Proposed Headquarters Server Farm Solution

      Proposed North American Plan Model

3. Designing Enterprise Edge Connectivity.

    Reviewing the Enterprise Edge Network Design Methodology

      Enterprise Edge Design

      Typical Requirements for the Enterprise Edge

      Enterprise Edge Design Methodology

      Analyzing Network Traffic Patterns

    Designing the Classic WAN Module

      Enterprise Needs for the WAN

      Selecting the WAN Topology

      Branch Office WAN

      Regional Office WAN

      Enterprise WAN Backbone

      Selecting a Service Provider

      Selecting the Data-Link Layer

      Selecting the Physical Layer

      Selecting WAN Features

      Selecting Cisco Edge Routing Solutions

      Routing Protocol and IP Addressing Considerations

      An Enterprise WAN Design Example

    Designing the Remote Access Module

      Enterprise Needs for Remote Access

      Selecting the Remote Access Type and Termination

      Selecting the Remote Access Physical Connectivity

      Selecting the Remote Access Protocol

      Selecting Cisco Access Routing Solutions

      Sizing the Central Site Remote Access Connection

      An Enterprise Remote Access Design Example

    Designing the Internet Connectivity Module

      Enterprise Requirements for the Internet

      Using NAT at the Enterprise Edge

      Designing ISP Connectivity Solutions

      Internet Connectivity Design Example



    Product Summary

    Standards and Specifications Summary

    Review Questions

    Case Study: OCSIC Bottling Company

      North American Plant Headquarters WAN

      Remote Access and Internet Connectivity Requirements

      International Manufacturing, Distribution, and Sales Plants

      International Plant Networks and Applications

      WAN Module Design

      Remote Access Design

      Internet Connectivity Module Design

4. Designing Network Management Services.

    Developing an Enterprise Network Management Strategy

      Functional Areas of Network Management


      Network Management Policies and Procedures



      Network Management Methods

      Reactive-Event Driven

      Proactive-Polling and Event Driven

      Network Management Strategy Process

      Network Management Module Functions

      Cisco Network Management Strategy


      CiscoWorks Common Management Foundation

      CiscoWorks LAN Management Solution

      Best Practices for Managing the LAN Using LMS

      CiscoWorks Routed WAN Management Solution

      Best Practices for Managing the WAN Using RWAN

    Designing the Network Management Architecture

    Network Management Design Considerations

      Network Management Infrastructure Considerations

      Network Management Data Collection and Management Considerations

      Network Management Station Sizing Considerations

      System Management Resource Considerations

    Network Management Deployment Recommendations

      Single Server Deployment

      Multiserver, Split Applications-Single Management Domain

      Multiple Management Domains

      Centralized WAN Management with LAN Management

      Key Questions to Consider

      Availability Manager Issues

    Network Management Design Scenarios

      Small Site Network Management Design Scenario

      Medium Site Network Management Design Scenario

      Large Site Network Management Design Scenario



    Product Summary

    Standards and Specification Summary

    Review Questions

    Case Study: OCSIC Bottling Company

5. Designing High-Availability Services.

    High-Availability Features and Options

      Network Requirements for High Availability

      Cisco IOS High-Availability Architecture

      Fault Tolerance and Hardware Redundancy

      Using Fault-Tolerant Devices

      Providing Redundancy in the Network Topology

      Route Processor Redundancy

      Network Interface Card Redundancy

      Options for Layer 3 Redundancy

      Redundancy and Spanning Tree Protocol

      PortFast and UplinkFast

    Designing High-Availability Enterprise Networks

      Design Guidelines for High Availability

      Redundancy Options

      Software Features and Protocol Attributes

      Carrier and Circuit Types

      Power Availability

      High-Availability Design Goals and Conclusions

      Best Practices for High-Availability Network Design

      Enterprise Campus Design Guidelines for High Availability

      Enterprise Edge Design Guidelines for High Availability

      High-Availability Design Example



    Product Summary

    Standards and Specifications Summary

    Review Questions

    Case Study: OCSIC Bottling Company

      High-Availability Design for the Campus Infrastructure Module

      High-Availability Strategy for the Server Farm Module

      High-Availability Strategy for the WAN Module

      High-Availability Strategy for the Remote Access Module

      High-Availability Strategy for the Internet Connectivity Module

      Revised Network Diagrams

6. Designing Security Services.

    Evaluating Network Security Policies

      Network Vulnerabilities

      Defining a Security Policy

      Network Security as a Process

      Securing the Network

      Monitoring Security

      Testing Security

      Improving Security

      Risk Assessment and Management

    Reviewing Cisco Security Solutions

      Key Elements of Network Security

      Network Security Attack Types and Their Solutions

      Packet Sniffers

      IP Spoofing

      DoS Attacks

      Password Attacks

      Man-in-the-Middle Attacks

      Application Layer Attacks

      Network Reconnaissance

      Trust Exploitation

      Port Redirection Attacks

      Unauthorized Access Attacks

      Viruses and Trojan Horses

      Firewall Design Options

      Implementing a Perimeter LAN

      Firewall Filtering Rules

      Perimeter Security: PIX Firewall

      Perimeter Security: IOS Firewall

      Intrusion Detection System Design Options

      IDS Operation

      IDS Deployment

      Authentication, Authorization, and Accounting




      Public Key Infrastructure

      IP Security

      Internet Key Exchange

      Authentication Header

      Encapsulating Security Payload

      Device Security Options






    Implementing Network Security Using the Cisco SAFE Security Blueprints

      Introduction to Cisco SAFE Architecture

      SAFE Security Strategies for Small Networks

      Small Network Internet Connectivity Module

      Small Network Campus Infrastructure Module

      SAFE Security Strategies for Medium Networks

      Medium Network Internet Connectivity

      Medium Network Campus Infrastructure Module

      Medium Network WAN Module

      SAFE Security Strategies for Large Networks

      Campus Infrastructure Module

      Secure Network Management Module

      Secure Server Farm Module

      Secure Edge Distribution Module

      SAFE Security Strategies for the Enterprise Edge

      E-Commerce Module

      Internet Connectivity Module

      Remote Access and VPN Module

      WAN Module Features



    Product Summary

    Standards and Specification Summary

    Review Questions

    Case Study: OCSIC Bottling Company

7. Designing QoS.

    Identifying QoS Mechanisms

      Enterprise Network Requirements for QoS


      Delay Variation

      Packet Loss

      QoS-Enabled Network

      QoS Architectures



      QoS Service Levels

      Classification and Marking

      Congestion Avoidance

      Congestion Management

      Traffic Conditioning

      CAR: Managing Access Bandwidth Policy and Performing Policing

      Traffic Shaping: Controlling Outbound Traffic Flow


      Link-Efficiency Mechanisms


      cRTP and dcRTP

      Summary of Key Cisco IOS Software QoS Categories and Features

    Designing QoS for Enterprise Networks

      QoS Design Guidelines

      QoS Design Guidelines for Data

      QoS Design Guidelines for Voice

      QoS Design Guidelines for Video Conferencing

      Designing QoS for the Enterprise Network

      Example: QoS Solution



    Product Summary

    Standards and Specifications Summary

    Review Questions

    Case Study: OCSIC Bottling Company

      QoS Design for the Site-to-Site WAN

      QoS Design for the Campus Infrastructure Module

8. Designing IP Multicast Services.

    Examining IP Multicast Services

      IP Multicast Basics

      IP Multicast Data-Delivery Principles

      Multicast Forwarding

      IP Multicast Group Membership and Distribution Trees

      Source Trees

      Shared Trees

      Comparison of Source Trees and Shared Trees

      Protocol Independent Multicast

      PIM Dense Mode

      PIM Sparse Mode

      Sparse Mode, Dense Mode, and Sparse-Dense Mode

      IP Multicast Control Mechanisms


      CGMP and IGMP Snooping

      Designing IP Multicast Solutions for Enterprise Networks

      IP Multicast Design Considerations for an Enterprise Campus

    Designing IP Multicast for a Small Campus

      Designing IP Multicast for a Large Enterprise Campus

      Designing IP Multicast Over a WAN



    Product Summary

    Standards and Specifications Summary

    Review Questions

    Case Study: OCSIC Bottling Company

      IP Multicast Design for OCSIC's New Application

9. Designing Virtual Private Networks.

    VPN Technologies

      Enterprise VPN Requirements

      VPN Tunneling

      VPN Security


      User Authentication


      VPN Termination

      VPN Concentrators

      VPN Client Software

      VPN Management

      VPN Management Considerations

      CiscoWorks VPN/Security Management Solution

    Designing Site-to-Site VPNs

      Site-to-Site VPN Requirements

      Key Design Considerations for Site-to-Site VPNs

      Hub-and-Spoke VPN Topologies

      Simple Full-Mesh VPN Topology

      Hierarchical VPN Topology

      High-Availability and Resiliency Considerations

      Using a Routing Protocol over the VPN

      Minimizing Packet Fragmentation

      Implementing IPSec

      Site-to-Site VPN Examples

      Example: Small Site-to-Site VPN

      Small Site-to-Site VPN Solution

      Example: Large Site-to-Site VPN

      Large Site-to-Site VPN Solution

    Designing Remote-Access VPNs

      Remote-Access VPN Requirements

      Remote-Access VPN Design Considerations

      Broadband Access Design Considerations

      Capacity Planning for Remote-Access VPNs

      NAT Issues

      One-to-One Translation

      Many-to-One Translation

      NAT Traversal

      VPN Split-Tunnel Communication

      Remote-Access VPN Examples

      Example: Small Remote-Access VPN

      Small Remote-Access VPN Solution

      Example: Large Remote-Access VPN

      Large Remote-Access VPN Solution



    Product Summary

    Standards and Specification Summary

    Review Questions

    Case Study: OCSIC Bottling Company

      Site-to-Site VPN Solution

      Remote-Access VPN Solution

      Revised Network Diagrams

10. Designing Enterprise Wireless Networks.

    Reviewing the Wireless LAN Solution

      Emerging Wireless Enterprise Network Needs

      Wireless Communication Architecture

      Access Point Coverage

      Cell Distribution

      802.11 Standards

      Cisco Wireless Solutions

      Access Points and Client Adapters

      Workgroup Bridges

      Wireless Bridges


    Designing WLANs for Enhanced Enterprise Communications

      Enterprise WLAN Design Considerations

      WLAN Data Rates

      Client Density and Throughput

      WLAN Coverage

      RF Environment

      Channel Selection

      Access-Point Placement and Number

      Inline Power


      IP Addressing

      Infrastructure Availability

      Back-End System Availability

      Access-Point Hot Standby Redundancy




      WLAN Security Design Considerations

      WLAN Security Extension-EAP

      WLAN LAN Extension-IPSec

      WLAN Static WEP

      Security Extension Comparison

      Cisco EAP

      Attack Mitigation Using EAP Authentication

      Attack Mitigation Using IPSec

      Small Office WLAN Design Model

      Enterprise WLAN Design Model

      Example: Enterprise WLAN Site Design

      Example: Enterprise WLAN Remote Office Design

      Remote-Access and Telecommuter WLAN Design Models



    Product Summary

    Standards and Specification Summary

    Review Questions

    Case Study: OCSIC Bottling Company

11. Designing IP Telephony Solutions.

    Reviewing the Cisco IP Telephony Solution

      Introducing the Cisco IP Telephony Solution

      Cisco CallManager

      Gateways and Control Protocols

      Transcoders and Conferencing

      Hardware Support

      Unicast Conference Bridge

      Cisco IP Telephony Applications

    Designing a Network for Cisco IP Telephony

      Cisco CallManager Cluster Design Considerations

      Cluster Deployment Guidelines

      Cluster Design

      Designing Single-Site IP Telephony Solutions

      Example: Single-Site

      Single-Site Solution

      Designing Multisite with Centralized Call Processing IP Telephony Solutions

      Designing Multisite with Distributed Call Processing IP Telephony Solutions

      Example: Distributed Call Processing

      Distributed Call Processing Solution

      Clustering over the IP WAN

      Local Failover

      Remote Failover

      Network Infrastructure Design Considerations

      Layer 2 Voice Transport

      VoIP over Leased Lines

      Voice over Frame Relay

      Voice over ATM

      Network Bandwidth Provisioning

      Provisioning for Voice Bearer Traffic

      Provisioning for Call Control Traffic

      Traffic Engineering

      Dial Plan Design Considerations

      Intelligent Network Services for IP Telephony and Voice

      IP Telephony Network Management Tools

      High Availability

      Voice Security

      QoS Design Considerations



    Product Summary

    Standards and Specification Summary

    Review Questions

    Case Study: OCSIC Bottling Company

12. Designing Content Networking Solutions.

    Reviewing the Content Networking Solution

      Enterprise Content Networking Requirements

      Content Networking Architecture

      Content Caching

      Transparent Caching Deployment

      Proxy Caching Deployment

      Reverse Proxy Caching Deployment

      Content Switching

      Content Routing

      Direct Mode Content Routing

      WCCP Mode Content Routing

      Content Distribution and Management

      Intelligent Network Services Integration

    Designing Content Networking Solutions

      Content Networking Design Considerations

      Content Networking Solutions for Web Content Delivery

      Example: Web Content Delivery

      Web Content Delivery Solution

      Content Networking Solutions for E-Commerce

      Example: E-Commerce

      E-Commerce Solution

      Content Networking Solutions for Streaming Media

      Example: Streaming Media

      Streaming Media Solution



    Product Summary

    Standards and Specification Summary

    Review Questions

    Case Study: OCSIC Bottling Company

13. Designing Storage Networking Solutions.

    Reviewing the Cisco Storage Networking Solution

      Enterprise Needs for Storage Networking

      Storage Consolidation

      Business Continuance and Backup

      Cisco Storage Networking Architecture

      Network Storage Models


      Network-Attached Storage

      Network Technology Enablers for Storage Networks



      Intelligent Network Services for Storage Networking

    Designing a Storage Networking Architecture with IP Access

      Designing a Storage Networking Architecture

      IP Access to Storage

      Example: IP Access to Storage

      IP Access to Storage Solution

      Storage over WAN

      Example: Storage over WAN

      Storage over WAN Solution

      Example: Storage over Optical Metro

      Storage over Optical Metro Solution

      Network-Attached Storage Model

      Example: Network-Attached Storage

      Network-Attached Storage Solution



    Product Summary

    Standards and Specification Summary

    Review Questions

    Case Study: OCSIC Bottling Company

Appendix A. Answers to Review Questions.

    Chapter 1

    Chapter 2

    Chapter 3

    Chapter 4

    Chapter 5

    Chapter 6

    Chapter 7

    Chapter 8

    Chapter 9

    Chapter 10

    Chapter 11

    Chapter 12

    Chapter 13




Download - 844 KB -- Index


Errata -- 25 KB

Submit Errata

Cisco Press Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Cisco Press and its family of brands. I can unsubscribe at any time.


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about Cisco Press products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information

To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.


Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites; develop new products and services; conduct educational research; and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.


If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information

Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.


This site is not directed to children under the age of 13.


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information

If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at and we will process the deletion of a user's account.


Users can always make an informed choice as to whether they should proceed with certain services offered by Cisco Press. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive:

Sale of Personal Information

Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to

Supplemental Privacy Statement for California Residents

California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure

Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact

Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice

We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020