larger cover

Add To My Wish List

Register your product to gain access to bonus material or receive a coupon.

CCNA Routing and Switching ICND2 200-105 Official Cert Guide, Academic Edition


  • Sorry, this book is no longer in print.
Not for Sale
  • About
  • Description
  • Downloads
  • Sample Content
  • Updates


  • Book content is fully updated to align to the new CCNA ICND2 exam objectives
  • Books and CDs are packed with features to help candidates master more difficult testing methods on the actual exams
  • Practice tests contain scenario-based questions that closely mimic the difficulty of the actual exam
  • Includes 60 minutes of video covering the complex topic of subnetting
  • In-depth expert explanations of all protocols, commands, and technologies on the ICND2 exam

  • Copyright 2017
  • Dimensions: 8" x 10"
  • Pages: 928
  • Edition: 1st
  • Book
  • ISBN-10: 1-58720-598-X
  • ISBN-13: 978-1-58720-598-9

Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for exam success. They are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam.

CCNA Routing and Switching ICND2 200-105 Official Cert Guide, Academic Editionis a comprehensive textbook and study package that provides you with a detailed overview of network configuration and troubleshooting. Best-selling author and expert instructor Wendell Odom shares study hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills.

This complete study package includes

·         A test-preparation routine proven to help you pass the exams

·         "Do I Know This Already?" quizzes, which enable you to decide how much time you need to spend on each section

·         Chapter-ending and part-ending exercises, which help you drill on key concepts you must know thoroughly

·         Troubleshooting sections, which help you master the complex scenarios you will face on the exam

·         A free copy of the eBook version of the text, available in PDF, EPUB, and Mobi (Kindle) formats

·         The powerful Pearson IT Certification Practice Test software, complete with hundreds of well-reviewed, exam-realistic questions, customization options, and detailed performance reports

·         A free copy of the CCNA ICND2 200-105 Network Simulator Lite software, complete with meaningful lab exercises that help you hone your hands-on skills with the command-line interface for routers and switches

·         Links to a series of hands-on config labs developed by the author

·         Online interactive practice exercises that help you hone your knowledge

·         More than 50 minutes of video mentoring from the author

·         A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies

·         Study plan suggestions and templates to help you organize and optimize your study time

Well regarded for its level of detail, study plans, assessment features, challenging review questions and exercises, video instruction, and hands-on labs, this official study guide helps you master the concepts and techniques that ensure your success.

This official study guide helps you master all the topics on the CCNA ICND2 exam, including

·         Ethernet LANs

·         IPv4 routing protocols

·         Wide area networks


Download: Chapter mapping for CCNA Routing and Switching 200-120 Network Simulator (10 KB .xlsx)

Online Sample Chapter

Implementing OSPF for IPv4

Sample Pages

Download the sample pages (includes Chapter 8 and the Index.)

Table of Contents


Your Study Plan

Part I Ethernet LANs

Chapter 1 Implementing Ethernet Virtual LANs

Foundation Topics

Virtual LAN Concepts

    Creating Multiswitch VLANs Using Trunking

    Forwarding Data Between VLANs

VLAN and VLAN Trunking Configuration and Verification

    Creating VLANs and Assigning Access VLANs to an Interface

    VLAN Trunking Protocol

    VLAN Trunking Configuration

    Implementing Interfaces Connected to Phones

Chapter Summary

Review Questions

Chapter Review

Chapter 2 Spanning Tree Protocol Concepts

Foundation Topics

Spanning Tree Protocol (IEEE 802.1D)

    The Need for Spanning Tree

    What IEEE 802.1D Spanning Tree Does

    How Spanning Tree Works

    Influencing and Changing the STP Topology

Rapid STP (IEEE 802.1w) Concepts

    Comparing STP and RSTP

    RSTP and the Alternate (Root) Port Role

    RSTP States and Processes

    RSTP and the Backup (Designated) Port Role

    RSTP Port Types

Optional STP Features



    BPDU Guard

Chapter Summary

Review Questions

Chapter Review

Chapter 3 Spanning Tree Protocol Implementation

Foundation Topics

Implementing STP

    Setting the STP Mode

    Connecting STP Concepts to STP Configuration Options

    Verifying STP Operation

    Configuring STP Port Costs

    Configuring Priority to Influence the Root Election

Implementing Optional STP Features

    Configuring PortFast and BPDU Guard

    Configuring EtherChannel

Implementing RSTP

    Identifying the STP Mode on a Catalyst Switch

    RSTP Port Roles

    RSTP Port States

    RSTP Port Types

Chapter Summary

Review Questions

Chapter Review

Chapter 4 LAN Troubleshooting

Foundation Topics

Troubleshooting STP

    Determining the Root Switch

    Determining the Root Port on Nonroot Switches

    Determining the Designated Port on Each LAN Segment

    STP Convergence

Troubleshooting Layer 2 EtherChannel

    Incorrect Options on the channel-group Command

    Configuration Checks Before Adding Interfaces to EtherChannels

Analyzing the Switch Data Plane Forwarding

    Predicting STP Impact on MAC Tables

    Predicting EtherChannel Impact on MAC Tables

    Choosing the VLAN of Incoming Frames

Troubleshooting VLANs and VLAN Trunks

    Access VLAN Configuration Incorrect

    Access VLANs Undefined or Disabled

    Mismatched Trunking Operational States

    Mismatched Supported VLAN List on Trunks

    Mismatched Native VLAN on a Trunk

Chapter Summary

Chapter Review

Chapter 5 VLAN Trunking Protocol

Foundation Topics

VLAN Trunking Protocol (VTP) Concepts

    Basic VTP Operation

    VTP Version 1 Versus Version 2

    VTP Pruning

    Summary of VTP Features

VTP Configuration and Verification

    Using VTP: Configuring Servers and Clients

    Verifying Switches Synchronized Databases

    Storing the VTP and Related Configuration

    Avoiding Using VTP

VTP Troubleshooting

    Determining Why VTP Is Not Synchronizing

    Common Rejections When Configuring VTP

    Problems When Adding Switches to a Network

Chapter Summary

Review Questions

Chapter Review

Chapter 6 Miscellaneous LAN Topics

Foundation Topics

Securing Access with IEEE 802.1x

AAA Authentication

    AAA Login Process

    TACACS+ and RADIUS Protocols

    AAA Configuration Examples

DHCP Snooping

    DHCP Snooping Basics

    An Example DHCP-based Attack

    How DHCP Snooping Works

    Summarizing DHCP Snooping Features

Switch Stacking and Chassis Aggregation

    Traditional Access Switching Without Stacking

    Switch Stacking of Access Layer Switches

    Switch Stack Operation as a Single Logical Switch

    Cisco FlexStack and FlexStack-Plus

    Chassis Aggregation

Chapter Summary

Review Questions

Chapter Review

Part I Review

Part II IPv4 Routing Protocols

Chapter 7 Understanding OSPF Concepts

Foundation Topics

Comparing Dynamic Routing Protocol Features

    Routing Protocol Functions

    Interior and Exterior Routing Protocols

    Comparing IGPs

    Administrative Distance

OSPF Concepts and Operation

    OSPF Overview

    Becoming OSPF Neighbors

    Exchanging the LSDB Between Neighbors

    Calculating the Best Routes with SPF

OSPF Area Design

    OSPF Areas

    How Areas Reduce SPF Calculation Time

    OSPF Area Design Advantages

Chapter Summary

Review Questions

Chapter Review

Chapter 8 Implementing OSPF for IPv4

Foundation Topics

Implementing Single-Area OSPFv2

    OSPF Single-Area Configuration

    Matching with the OSPF network Command

    Verifying OSPFv2 Single Area

    Configuring the OSPF Router ID

    OSPF Passive Interfaces

Implementing Multiarea OSPFv2

    Single-Area Configurations

    Multiarea Configuration

    Verifying the Multiarea Configuration

Additional OSPF Features

    OSPF Default Routes

    OSPF Metrics (Cost)

    OSPF Load Balancing

    OSPFv2 Interface Configuration

Chapter Summary

Review Questions

Chapter Review

Chapter 9 Understanding EIGRP Concepts

Foundation Topics

EIGRP and Distance Vector Routing Protocols

    Introduction to EIGRP

    Basic Distance Vector Routing Protocol Features

    EIGRP as an Advanced DV Protocol

EIGRP Concepts and Operation

    EIGRP Neighbors

    Exchanging EIGRP Topology Information

    Calculating the Best Routes for the Routing Table

    EIGRP Convergence

Chapter Summary

Review Questions

Chapter Review

Chapter 10 Implementing EIGRP for IPv4

Foundation Topics

Core EIGRP Configuration and Verification

    EIGRP Configuration

    Configuring EIGRP Using a Wildcard Mask

    Verifying EIGRP Core Features

EIGRP Metrics, Successors, and Feasible Successors

    Viewing the EIGRP Topology Table

    Examining the Metric Components

Other EIGRP Configuration Settings

    Load Balancing Across Multiple EIGRP Routes

    Tuning the EIGRP Metric Calculation

    Autosummarization and Discontiguous Classful Networks

Chapter Summary

Review Questions

Chapter Review

Chapter 11 Troubleshooting IPv4 Routing Protocols

Foundation Topics

Perspectives on Troubleshooting Routing Protocol Problems

Interfaces Enabled with a Routing Protocol

    EIGRP Interface Troubleshooting

    OSPF Interface Troubleshooting

Neighbor Relationships

    EIGRP Neighbor Verification Checks

    EIGRP Neighbor Troubleshooting Example

    OSPF Neighbor Troubleshooting

    Other OSPF Issues

Chapter Summary

Chapter Review

Chapter 12 Implementing External BGP

Foundation Topics

BGP Concepts

    Advertising Routes with BGP

    Internal and External BGP

    Choosing the Best Routes with BGP

    eBGP and the Internet Edge

eBGP Configuration and Verification

    BGP Configuration Concepts

    Configuring eBGP Neighbors Using Link Addresses

    Injecting BGP Table Entries with the network Command

    Learning a Default Route from the ISP

Chapter Summary

Review Questions

Chapter Review

Part II Review

Part III Wide-Area Networks

Chapter 13 Implementing Point-to-Point WANs

Foundation Topics

Leased-Line WANs with HDLC

    Layer 1 Leased Lines

    Layer 2 Leased Lines with HDLC

    Configuring HDLC

Leased-Line WANs with PPP

    PPP Concepts

    Implementing PPP

    Implementing PPP CHAP

    Implementing PPP PAP

    Implementing Multilink PPP

Troubleshooting Serial Links

    Troubleshooting Layer 1 Problems

    Troubleshooting Layer 2 Problems

    Troubleshooting Layer 3 Problems

Chapter Summary

Review Questions

Chapter Review

Chapter 14 Private WANs with Ethernet and MPLS

Foundation Topics

Metro Ethernet

    Metro Ethernet Physical Design and Topology

    Ethernet WAN Services and Topologies

    Layer 3 Design Using Metro Ethernet

    Ethernet Virtual Circuit Bandwidth Profiles

Multiprotocol Label Switching (MPLS)

    MPLS VPN Physical Design and Topology

    MPLS and Quality of Service

    Layer 3 with MPLS VPN

Chapter Summary

Review Questions

Chapter Review

Chapter 15 Private WANs with Internet VPN

Foundation Topics

Internet Access and Internet VPN Fundamentals

    Internet Access

    Internet VPN Fundamentals

GRE Tunnels and DMVPN

    GRE Tunnel Concepts

    Configuring GRE Tunnels

    Verifying a GRE Tunnel

    Troubleshooting GRE Tunnels

    Multipoint Internet VPNs Using DMVPN

PPP over Ethernet

    PPPoE Concepts

    PPPoE Configuration

    PPPoE Verification

    PPPoE Troubleshooting

Chapter Summary

Review Questions

Chapter Review

Part III Review

Part IV IPv4 Services: ACLs and QoS

Chapter 16 Basic IPv4 Access Control Lists

Foundation Topics

IPv4 Access Control List Basics

    ACL Location and Direction

    Matching Packets

    Taking Action When a Match Occurs

    Types of IP ACLs

Standard Numbered IPv4 ACLs

    List Logic with IP ACLs

    Matching Logic and Command Syntax

    Implementing Standard IP ACLs

    Troubleshooting and Verification Tips

Practice Applying Standard IP ACLs

    Practice Building access-list Commands

    Reverse Engineering from ACL to Address Range

Chapter Summary

Review Questions

Chapter Review

Chapter 17 Advanced IPv4 Access Control Lists

Foundation Topics

Extended Numbered IP Access Control Lists

    Matching the Protocol, Source IP, and Destination IP

    Matching TCP and UDP Port Numbers

    Extended IP ACL Configuration

    Practice Building access-list Commands

Named ACLs and ACL Editing

    Named IP Access Lists

    Editing ACLs Using Sequence Numbers

    Numbered ACL Configuration Versus Named ACL Configuration

    ACL Implementation Considerations

Troubleshooting with IPv4 ACLs

    Analyzing ACL Behavior in a Network

    ACL Interactions with Router-Generated Packets

Chapter Summary

Review Questions

Chapter Review

Chapter 18 Quality of Service (QoS)

Foundation Topics

Introduction to QoS

    QoS: Managing Bandwidth, Delay, Jitter, and Loss

    Types of Traffic

    QoS as Mentioned in This Book

    QoS on Switches and Routers

Classification and Marking

    Classification Basics

    Matching (Classification) Basics

    Classification on Routers with ACLs and NBAR

    Marking IP DSCP and Ethernet CoS

    Defining Trust Boundaries

    DiffServ Suggested Marking Values

Congestion Management (Queuing)

    Round Robin Scheduling (Prioritization)

    Low Latency Queuing

    A Prioritization Strategy for Data, Voice, and Video

Shaping and Policing



Congestion Avoidance

    TCP Windowing Basics

    Congestion Avoidance Tools

Chapter Summary

Review Questions

Chapter Review

Part IV Review

Part V IPv4 Routing and Troubleshooting

Chapter 19 IPv4 Routing in the LAN

Foundation Topics

VLAN Routing with Router 802.1Q Trunks

    Configuring ROAS

    Verifying ROAS

    Troubleshooting ROAS

VLAN Routing with Layer 3 Switch SVIs

    Configuring Routing Using Switch SVIs

    Verifying Routing with SVIs

    Troubleshooting Routing with SVIs

VLAN Routing with Layer 3 Switch Routed Ports

    Implementing Routed Interfaces on Switches

    Implementing Layer 3 EtherChannels

    Troubleshooting Layer 3 EtherChannels

Chapter Summary

Review Questions

Chapter Review

Chapter 20 Implementing HSRP for First-Hop Routing

Foundation Topics

FHRP and HSRP Concepts

    The Need for Redundancy in Networks

    The Need for a First Hop Redundancy Protocol

    The Three Solutions for First-Hop Redundancy

    HSRP Concepts

Implementing HSRP

    Configuring and Verifying Basic HSRP

    HSRP Active Role with Priority and Preemption

    HSRP Versions

Troubleshooting HSRP

    Checking HSRP Configuration

    Symptoms of HSRP Misconfiguration

Chapter Summary

Review Questions

Chapter Review

Chapter 21 Troubleshooting IPv4 Routing

Foundation Topics

Problems Between the Host and the Default Router

    Root Causes Based on a Host’s IPv4 Settings

    Root Causes Based on the Default Router’s Configuration

Problems with Routing Packets Between Routers

    IP Forwarding by Matching the Most Specific Route

    Routing Problems Caused by Incorrect Addressing Plans

    Pointers to Related Troubleshooting Topics

Chapter Summary

Chapter Review

Part V Review

Part VI IPv6

Chapter 22 IPv6 Routing Operation and Troubleshooting

Foundation Topics

Normal IPv6 Operation

    Unicast IPv6 Addresses and IPv6 Subnetting

    Assigning Addresses to Hosts

    Router Address and Static Route Configuration

    Verifying IPv6 Connectivity

Troubleshooting IPv6

    Pings from the Host Work Only in Some Cases

    Pings Fail from a Host to Its Default Router

    Problems Using Any Function That Requires DNS

    Host Is Missing IPv6 Settings: Stateful DHCP Issues

    Host Is Missing IPv6 Settings: SLAAC Issues

    Traceroute Shows Some Hops, But Fails

    Routing Looks Good, But Traceroute Still Fails

Chapter Summary

Chapter Review

Chapter 23 Implementing OSPF for IPv6

Foundation Topics

OSPFv3 for IPv6 Concepts

    IPv6 Routing Protocol Versions and Protocols

    Two Options for Implementing Dual Stack with OSPF

    OSPFv2 and OSPFv3 Internals

OSPFv3 Configuration

    Basic OSPFv3 Configuration

    Other OSPFv3 Configuration Settings

OSPFv3 Verification and Troubleshooting

    OSPFv3 Interfaces

    OSPFv3 Neighbors

    OSPFv3 LSDB and LSAs

    The Issue of IPv6 MTU

    OSPFv3 Metrics and IPv6 Routes

Chapter Summary

Review Questions

Chapter Review

Chapter 24 Implementing EIGRP for IPv6

Foundation Topics

EIGRP for IPv6 Configuration

    EIGRP for IPv6 Configuration Basics

    EIGRP for IPv6 Configuration Example

    Other EIGRP for IPv6 Configuration Settings

    EIGRP for IPv6 Verification and Troubleshooting

Chapter Summary

Review Questions

Chapter Review

Chapter 25 IPv6 Access Control Lists

Foundation Topics

IPv6 Access Control List Basics

    Similarities and Differences Between IPv4 and IPv6 ACLs

    ACL Location and Direction

    IPv6 Filtering Policies

    ICMPv6 Filtering Caution

    Capabilities of IPv6 ACLs

    Limitations of IPv6 ACLs

    Configuring Standard IPv6 ACLs

    Configuring Extended IPv6 ACLs

Other IPv6 ACL Topics

    Implicit IPv6 ACL Rules

    IPv6 Management Control ACLs

Chapter Summary

Review Questions

Chapter Review

Part VI Review

Part VII Miscellaneous

Chapter 26 Network Management

Foundation Topics

Simple Network Management Protocol

    SNMP Concepts

    Implementing SNMP Version 2c

    Implementing SNMP Version 3

IP Service Level Agreement

    An Overview of IP SLA

    Basic IP SLA ICMP-Echo Configuration

    Troubleshooting Using IP SLA Counters

    Troubleshooting Using IP SLA History


    SPAN Concepts

    Configuring Local SPAN

    SPAN Session Parameters for Troubleshooting

Chapter Summary

Review Questions

Chapter Review

Chapter 27 Cloud Computing

Foundation Topics

Cloud Computing Concepts

    Server Virtualization

    Cloud Computing Services

    Cloud and the “As a Service” Model

WAN Traffic Paths to Reach Cloud Services

    Enterprise WAN Connections to Public Cloud

    A Scenario: Branch Offices and the Public Cloud

Virtual Network Functions and Services

    Virtual Network Functions: Firewalls and Routers

    DNS Services

    Address Assignment Services and DHCP


Chapter Summary

Review Questions

Chapter Review

Chapter 28 SDN and Network Programmability

Foundation Topics

SDN and Network Programmability Basics

    The Data, Control, and Management Planes

    Controllers and Network Architecture

    SDN Architecture Summary

Examples of Network Programmability and SDN

    Open SDN and OpenFlow

    The Cisco Application Centric Infrastructure

    The Cisco APIC Enterprise Module

    Comparing the Three Examples

Cisco APIC-EM Path Trace ACL Analysis Application

    APIC-EM Path Trace App

    APIC-EM Path Trace ACL Analysis Tool Timing and Exam Topic

Chapter Summary

Review Questions

Chapter Review

Part VII Review

Part VIII Final Prep

Chapter 29 Final Review

Advice About the Exam Event

    Learn the Question Types Using the Cisco Certification Exam Tutorial

    Think About Your Time Budget Versus Number of Questions

    A Suggested Time-Check Method

    Miscellaneous Pre-Exam Suggestions

    Reserve the Hour After the Exam in Case You Fail

Exam Review

Take Practice Exams

    Practicing Taking the ICND2 or CCNA R&S Exam

    Advice on How to Answer Exam Questions

    Taking Other Practice Exams

Find Knowledge Gaps Through Question Review

Practice Hands-On CLI Skills

    Review Mind Maps from Part Review

    Do Labs

Assess Whether You Are Ready to Pass (and the Fallacy of Exam Scores)

Study Suggestions After Failing to Pass

Other Study Tasks

Final Thoughts

Part IX Appendixes

Appendix A Numeric Reference Tables

Appendix B CCNA ICND2 200-105 Exam Updates


DVD Appendixes

Appendix C Answers to the Review Questions

Appendix D Practice for Chapter 16: Basic IPv4 Access Control Lists

Appendix E Mind Map Solutions

Appendix F Study Planner

Appendix G Learning IPv4 Routes with RIPv2

Appendix H Understanding Frame Relay Concepts

Appendix I Implementing Frame Relay

Appendix J IPv4 Troubleshooting Tools

Appendix K Topics from Previous Editions

Appendix L Exam Topic Cross Reference

9781587205989    TOC    7/11/2016


We've made every effort to ensure the accuracy of this book and its companion content. Any errors that have been confirmed since this book was published can be downloaded below.

Download the errata

Submit Errata

Cisco Press Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Cisco Press and its family of brands. I can unsubscribe at any time.


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about Cisco Press products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information

To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.


Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites; develop new products and services; conduct educational research; and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.


If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information

Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.


This site is not directed to children under the age of 13.


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information

If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at and we will process the deletion of a user's account.


Users can always make an informed choice as to whether they should proceed with certain services offered by Cisco Press. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive:

Sale of Personal Information

Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to

Supplemental Privacy Statement for California Residents

California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure

Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact

Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice

We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020