Home > Store

Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide Premium Edition and Practice Test

Premium Edition eBook

  • Your Price: $47.99
  • List Price: $59.99
  • About Premium Edition eBooks
  • The Premium Edition eBook and Practice Test is a digital-only certification preparation product combining an eBook with enhanced Pearson Test Prep practice tests.

    Your purchase will deliver:

    • Link to download the Pearson Test Prep exam engine
    • Access code for question database
    • eBook in the following formats, accessible from your Account page after purchase:

    EPUB The open industry format known for its reflowable content and usability on supported mobile devices.

    PDF The popular standard, which reproduces the look and layout of the printed page.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

    eBook FAQ

    eBook Download Instructions

Also available in other formats.

Register your product to gain access to bonus material or receive a coupon.


  • Copyright 2021
  • Dimensions: 7-3/8" x 9-1/8"
  • Edition: 1st
  • Premium Edition eBook
  • ISBN-10: 0-13-691764-X
  • ISBN-13: 978-0-13-691764-9

The exciting new Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide, Premium Edition eBook and Practice Test is a digital-only certification preparation product combining an eBook with enhanced Pearson Test Prep Practice Test. This eBook covers all exam topics on the Cisco CyberOps Associate CBROPS 200-201 exam. The Premium Edition eBook and Practice Test contains the following items:

  • The Cisco CyberOps Associate CBROPS 200-201 Premium Edition Practice Test, including four full practice exams and enhanced practice test features
  • PDF and EPUB formats of the Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide from Cisco Press, which are accessible via your PC, tablet, and Smartphone

About the Premium Edition Practice Test

This Premium Edition contains an enhanced version of the Pearson Test Prep practice test software with four full practice exams. In addition, it contains all the chapter-opening assessment questions from the book. This integrated learning package

  • Allows you to focus on individual topic areas or take complete, timed exams
  • Includes direct links from each question to detailed tutorials to help you understand the concepts behind the questions
  • Provides unique sets of exam-realistic practice questions
  • Tracks your performance and provides feedback on a module-by-module basis, laying out a complete assessment of your knowledge to help you focus your study where it is needed most

Pearson Test Prep online system requirements:

Browsers: Chrome version 73 and above; Safari version 12 and above; Microsoft Edge 44 and above.

Devices: Desktop and laptop computers, tablets running on Android v8.0 and iOS v13, smartphones with a minimum screen size of 4.7. Internet access required.

Pearson Test Prep offline system requirements: Windows 10, Windows 8.1; Microsoft .NET Framework 4.5 Client; Pentium-class 1 GHz processor (or equivalent); 512 MB RAM; 650 MB disk space plus 50 MB for each downloaded practice exam; access to the Internet to register and download exam databases

About the Premium Edition eBook

Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide from Cisco Press enables you to succeed on the exam the first time and is the only self-study resource approved by Cisco. Best-selling author Omar Santos shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills.

This complete study package includes

·        A test-preparation routine proven to help you pass the exams

·        Do I Know This Already? quizzes, which enable you to decide how much time you need to spend on each section

·        Chapter-ending Key Topic tables,which help you drill on key concepts you must know thoroughly

·        The powerful Pearson Test Prep Practice Test software, complete with hundreds of well-reviewed, exam-realistic questions, customization options, and detailed performance reports

·        Online, interactive practice exercises that help you enhance your knowledge

·        An online, interactive Flash Cards application to help you drill on Key Terms by chapter

·        A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies

·        Study plan suggestions and templates to help you organize and optimize your study time

Well regarded for its level of detail, study plans, assessment features, hands-on labs, and challenging review questions and exercises, this official study guide helps you master the concepts and techniques that ensure your exam success.

Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide walks you through all the exam topics found in the Cisco 200-201 exam. Topics covered include

·        Security concepts

·        Security monitoring

·        Host-based analysis

·        Network intrusion analysis

·        Security policies and procedures

Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide Companion Website

Access interactive study tools on this book's companion website, including practice test software, review exercises, Key Term flash card application, a study planner, and more!

To access the companion website, simply follow these steps:

1.         Go to www.Ciscopress.com/register.

2.         Enter the print book ISBN: 9780136807834.

3.         Answer the security question to validate your purchase.

4.         Go to your account page.

5.         Click on the Registered Products tab.

6.         Under the book listing, click on the Access Bonus Content link.

If you have any issues accessing the companion website, you can contact our support team by going to http://pearsonitp.echelp.org.

Sample Content

Sample Pages

Download the sample pages (includes Chapter 12)

Table of Contents

Introduction xxvi
Chapter 1 Cybersecurity Fundamentals 2
Do I Know This Already? Quiz 3
Foundation Topics 8
Introduction to Cybersecurity 8
    Cybersecurity vs. Information Security (Infosec) 8
    The NIST Cybersecurity Framework 9
    Additional NIST Guidance and Documents 9
    The International Organization for Standardization 10
Threats, Vulnerabilities, and Exploits 10
    What Is a Threat? 10
    What Is a Vulnerability? 11
    What Is an Exploit? 13
    Risk, Assets, Threats, and Vulnerabilities 15
    Threat Actors 17
    Threat Intelligence 17
    Threat Intelligence Platform 19
    Vulnerabilities, Exploits, and Exploit Kits 20
    SQL Injection 21
    HTML Injection 22
    Command Injection 22
    Authentication-Based Vulnerabilities 22
    Cross-Site Scripting 25
    Cross-Site Request Forgery 27
    Cookie Manipulation Attacks 27
    Race Conditions 27
    Unprotected APIs 27
    Return-to-LibC Attacks and Buffer Overflows 28
    OWASP Top 10 29
    Security Vulnerabilities in Open-Source Software 29
Network Security Systems 30
    Traditional Firewalls 30
    Firewalls in the Data Center 42
    Virtual Firewalls 44
    Deep Packet Inspection 44
    Next-Generation Firewalls 45
Intrusion Detection Systems and Intrusion Prevention Systems 46
    Pattern Matching and Stateful Pattern-Matching Recognition 47
    Protocol Analysis 48
    Heuristic-Based Analysis 49
    Anomaly-Based Analysis 49
    Global Threat Correlation Capabilities 50
    Next-Generation Intrusion Prevention Systems 50
    Firepower Management Center 50
Advanced Malware Protection 50
    AMP for Endpoints 50
    AMP for Networks 53
Web Security Appliance 54
Email Security Appliance 58
Cisco Security Management Appliance 60
Cisco Identity Services Engine 60
Security Cloud-Based Solutions 62
    Cisco Cloud Email Security 62
    Cisco AMP Threat Grid 62
    Umbrella (OpenDNS) 63
    Stealthwatch Cloud 63
    CloudLock 64
Cisco NetFlow 64
Data Loss Prevention 65
The Principles of the Defense-in-Depth Strategy 66
Confidentiality, Integrity, and Availability: The CIA Triad 69
    Confidentiality 69
    Integrity 70
    Availability 70
Risk and Risk Analysis 70
Personally Identifiable Information and Protected Health Information 72
    PII 72
    PHI 72
Principle of Least Privilege and Separation of Duties 73
    Principle of Least Privilege 73
    Separation of Duties 73
Security Operations Centers 74
Playbooks, Runbooks, and Runbook Automation 75
Digital Forensics 76
Exam Preparation Tasks 78
Chapter 2 Introduction to Cloud Computing and Cloud Security 82
Do I Know This Already? Quiz 82
Foundation Topics 84
Cloud Computing and the Cloud Service Models 84
Cloud Security Responsibility Models 86
    Patch Management in the Cloud 88
    Security Assessment in the Cloud 88
DevOps, Continuous Integration (CI), Continuous Delivery (CD), and DevSecOps 88
    The Agile Methodology 89
    DevOps 90
    CI/CD Pipelines 90
    The Serverless Buzzword 92
    A Quick Introduction to Containers and Docker 92
    Container Management and Orchestration 94
Understanding the Different Cloud Security Threats 95
    Cloud Computing Attacks 97
Exam Preparation Tasks 99
Chapter 3 Access Control Models 102
Do I Know This Already? Quiz 102
Foundation Topics 105
Information Security Principles 105
Subject and Object Definition 106
Access Control Fundamentals 107
    Identification 107
    Authentication 108
    Authorization 110
    Accounting 110
    Access Control Fundamentals: Summary 110
Access Control Process 111
    Asset Classification 112
    Asset Marking 113
    Access Control Policy 114
    Data Disposal 114
Information Security Roles and Responsibilities 115
Access Control Types 117
Access Control Models 119
    Discretionary Access Control 121
    Mandatory Access Control 122
    Role-Based Access Control 123
    Attribute-Based Access Control 125
Access Control Mechanisms 127
Identity and Access Control Implementation 129
    Authentication, Authorization, and Accounting Protocols 130
    Port-Based Access Control 135
    Network Access Control List and Firewalling 138
    Identity Management and Profiling 140
    Network Segmentation 141
    Intrusion Detection and Prevention 144
    Antivirus and Antimalware 148
Exam Preparation Tasks 149
Chapter 4 Types of Attacks and Vulnerabilities 152
Do I Know This Already? Quiz 152
Foundation Topics 154
Types of Attacks 154
    Reconnaissance Attacks 154
    Social Engineering 160
    Privilege Escalation Attacks 162
    Backdoors 163
    Buffer Overflows and Code Execution 163
    Man-in-the Middle Attacks 165
    Denial-of-Service Attacks 166
    Direct DDoS 166
    Botnets Participating in DDoS Attacks 167
    Reflected DDoS Attacks 167
    Attack Methods for Data Exfiltration 168
    ARP Cache Poisoning 169
    Spoofing Attacks 170
    Route Manipulation Attacks 171
    Password Attacks 171
    Wireless Attacks 172
Types of Vulnerabilities 172
Exam Preparation Tasks 174
Chapter 5 Fundamentals of Cryptography and Public Key Infrastructure (PKI) 178
Do I Know This Already? Quiz 178
Foundation Topics 182
Cryptography 182
    Ciphers and Keys 182
    Keys 183
    Key Management 183
Block and Stream Ciphers 183
    Block Ciphers 184
    Stream Ciphers 184
Symmetric and Asymmetric Algorithms 184
    Symmetric Algorithms 184
    Asymmetric Algorithms 185
    Elliptic Curve 186
    Quantum Cryptography 187
    More Encryption Types 187
Hashes 189
    Hashed Message Authentication Code 191
Digital Signatures 192
    Digital Signatures in Action 192
Next-Generation Encryption Protocols 195
IPsec and SSL/TLS 196
    IPsec 196
    Secure Sockets Layer and Transport Layer Security 196
    SSH 198
Fundamentals of PKI 199
    Public and Private Key Pairs 199
    RSA Algorithm, the Keys, and Digital Certificates 199
    Certificate Authorities 200
Root and Identity Certificates 202
    Root Certificate 202
    Identity Certificates 204
    X.500 and X.509v3 204
    Authenticating and Enrolling with the CA 205
    Public Key Cryptography Standards 206
    Simple Certificate Enrollment Protocol 206
Revoking Digital Certificates 207
Using Digital Certificates 207
    PKI Topologies 208
    Cross-Certifying CAs 208
Exam Preparation Tasks 209
Chapter 6 Introduction to Virtual Private Networks (VPNs) 212
Do I Know This Already? Quiz 212
Foundation Topics 214
What Are VPNs? 214
Site-to-Site vs. Remote-Access VPNs 215
An Overview of IPsec 216
    IKEv1 Phase 1 217
    IKEv1 Phase 2 220
    IKEv2 222
SSL VPNs 225
    SSL VPN Design Considerations 227
Exam Preparation Tasks 229
Chapter 7 Introduction to Security Operations Management 232
Do I Know This Already? Quiz 232
Foundation Topics 235
Introduction to Identity and Access Management 235
    Phases of the Identity and Access Life Cycle 235
    Password Management 236
    Directory Management 241
    Single Sign-On 243
    Federated SSO 246
Security Events and Log Management 251
    Log Collection, Analysis, and Disposal 251
    Security Information and Event Manager 255
    Security Orchestration, Automation, and Response (SOAR) 257
    SOC Case Management (Ticketing) Systems 257
Asset Management 257
    Asset Inventory 258
    Asset Ownership 259
    Asset Acceptable Use and Return Policies 259
    Asset Classification 260
    Asset Labeling 260
    Asset and Information Handling 260
    Media Management 260
Introduction to Enterprise Mobility Management 261
    Mobile Device Management 263
Configuration and Change Management 268
    Configuration Management 268
    Change Management 270
Vulnerability Management 273
    Vulnerability Identification 273
    Vulnerability Analysis and Prioritization 282
    Vulnerability Remediation 286
Patch Management 287
Exam Preparation Tasks 291
Chapter 8 Fundamentals of Intrusion Analysis 294
Do I Know This Already? Quiz 294
Foundation Topics 299
Introduction to Incident Response 299
The Incident Response Plan 301
The Incident Response Process 302
    The Preparation Phase 302
    The Detection and Analysis Phase 302
    Containment, Eradication, and Recovery 303
    Post-Incident Activity (Postmortem) 304
Information Sharing and Coordination 304
Incident Response Team Structure 307
    Computer Security Incident Response Teams 307
    Product Security Incident Response Teams 309
    National CSIRTs and Computer Emergency Response Teams 314
    Coordination Centers 315
    Incident Response Providers and Managed Security Service Providers (MSSPs) 315
Common Artifact Elements and Sources of Security Events 316
    The 5-Tuple 317
    File Hashes 320
    Tips on Building Your Own Lab 321
    False Positives, False Negatives, True Positives, and True Negatives 326
Understanding Regular Expressions 327
Protocols, Protocol Headers, and Intrusion Analysis 330
How to Map Security Event Types to Source Technologies 333
Exam Preparation Tasks 335
Chapter 9 Introduction to Digital Forensics 338
Do I Know This Already? Quiz 338
Foundation Topics 341
Introduction to Digital Forensics 341
The Role of Attribution in a Cybersecurity Investigation 342
The Use of Digital Evidence 342
    Defining Digital Forensic Evidence 343
    Understanding Best, Corroborating, and Indirect or Circumstantial Evidence 343
    Collecting Evidence from Endpoints and Servers 344
    Using Encryption 345
    Analyzing Metadata 345
    Analyzing Deleted Files 346
    Collecting Evidence from Mobile Devices 346
    Collecting Evidence from Network Infrastructure Devices 346
Evidentiary Chain of Custody 348
Reverse Engineering 351
Fundamentals of Microsoft Windows Forensics 353
    Processes, Threads, and Services 353
    Memory Management 356
    Windows Registry 357
    The Windows File System 359
    FAT 360
    NTFS 361
Fundamentals of Linux Forensics 362
    Linux Processes 362
    Ext4 366
    Journaling 366
    Linux MBR and Swap File System 366
Exam Preparation Tasks 367
Chapter 10 Network Infrastructure Device Telemetry and Analysis 370
Do I Know This Already? Quiz 370
Foundation Topics 373
Network Infrastructure Logs 373
    Network Time Protocol and Why It Is Important 374
    Configuring Syslog in a Cisco Router or Switch 376
Traditional Firewall Logs 378
    Console Logging 378
    Terminal Logging 379
    ASDM Logging 379
    Email Logging 379
    Syslog Server Logging 379
    SNMP Trap Logging 379
    Buffered Logging 379
    Configuring Logging on the Cisco ASA 379
Syslog in Large-Scale Environments 381
    Splunk 381
    Graylog 381
    Elasticsearch, Logstash, and Kibana (ELK) Stack 382
Next-Generation Firewall and Next-Generation IPS Logs 385
NetFlow Analysis 395
    What Is a Flow in NetFlow? 399
    The NetFlow Cache 400
    NetFlow Versions 401
    IPFIX 402
    IPFIX Architecture 403
    IPFIX Mediators 404
    IPFIX Templates 404
    Commercial NetFlow Analysis Tools 404
    Big Data Analytics for Cybersecurity Network Telemetry 411
    Cisco Application Visibility and Control (AVC) 413
Network Packet Capture 414
    tcpdump 415
    Wireshark 417
Network Profiling 418
    Throughput 419
    Measuring Throughput 421
    Used Ports 423
    Session Duration 424
    Critical Asset Address Space 424
Exam Preparation Tasks 427
Chapter 11 Endpoint Telemetry and Analysis 430
Do I Know This Already? Quiz 430
Foundation Topics 435
Understanding Host Telemetry 435
    Logs from User Endpoints 435
    Logs from Servers 440
Host Profiling 441
    Listening Ports 441
    Logged-in Users/Service Accounts 445
    Running Processes 448
    Applications Identification 450
Analyzing Windows Endpoints 454
    Windows Processes and Threads 454
    Memory Allocation 456
    The Windows Registry 458
    Windows Management Instrumentation 460
    Handles 462
    Services 463
    Windows Event Logs 466
Linux and macOS Analysis 468
    Processes in Linux 468
    Forks 471
    Permissions 472
    Symlinks 479
    Daemons 480
    Linux-Based Syslog 481
    Apache Access Logs 484
    NGINX Logs 485
Endpoint Security Technologies 486
    Antimalware and Antivirus Software 486
    Host-Based Firewalls and Host-Based Intrusion Prevention 488
    Application-Level Whitelisting and Blacklisting 490
    System-Based Sandboxing 491
    Sandboxes in the Context of Incident Response 493
Exam Preparation Tasks 494
Chapter 12 Challenges in the Security Operations Center (SOC) 496
Do I Know This Already? Quiz 496
Foundation Topics 499
Security Monitoring Challenges in the SOC 499
    Security Monitoring and Encryption 500
    Security Monitoring and Network Address Translation 501
    Security Monitoring and Event Correlation Time Synchronization 502
    DNS Tunneling and Other Exfiltration Methods 502
    Security Monitoring and Tor 504
    Security Monitoring and Peer-to-Peer Communication 505
Additional Evasion and Obfuscation Techniques 506
    Resource Exhaustion 508
    Traffic Fragmentation 509
    Protocol-Level Misinterpretation 510
    Traffic Timing, Substitution, and Insertion 511
    Pivoting 512
Exam Preparation Tasks 517
Chapter 13 The Art of Data and Event Analysis 520
Do I Know This Already? Quiz 520
Foundation Topics 522
Normalizing Data 522
    Interpreting Common Data Values into a Universal Format 523
Using the 5-Tuple Correlation to Respond to Security Incidents 523
Using Retrospective Analysis and Identifying Malicious Files 525
    Identifying a Malicious File 526
Mapping Threat Intelligence with DNS and Other Artifacts 527
Using Deterministic Versus Probabilistic Analysis 527
Exam Preparation Tasks 528
Chapter 14 Classifying Intrusion Events into Categories 530
Do I Know This Already? Quiz 530
Foundation Topics 532
Diamond Model of Intrusion 532
Cyber Kill Chain Model 539
    Reconnaissance 540
    Weaponization 543
    Delivery 544
    Exploitation 545
    Installation 545
    Command and Control 546
    Action on Objectives 547
The Kill Chain vs. MITREs ATT&CK 548
Exam Preparation Tasks 550
Chapter 15 Introduction to Threat Hunting 552
Do I Know This Already? Quiz 552
Foundation Topics 554
What Is Threat Hunting? 554
    Threat Hunting vs. Traditional SOC Operations vs. Vulnerability Management 555
The Threat-Hunting Process 556
    Threat-Hunting Maturity Levels 557
Threat Hunting and MITREs ATT&CK 558
    Automated Adversarial Emulation 563
Threat-Hunting Case Study 567
Threat Hunting, Honeypots, Honeynets, and Active Defense 571
Exam Preparation Tasks 571
Chapter 16 Final Preparation 574
Hands-on Activities 574
Suggested Plan for Final Review and Study 574
Summary 575
Glossary of Key Terms 577
Appendix A Answers to the Do I Know This Already? Quizzes and Review Questions 592
Appendix B Understanding Cisco Cybersecurity Operations Fundamentals CBROPS 200-201 Exam Updates 614

Online Elements
Appendix C Study Planner
Glossary of Key Terms

9780136807834    TOC    10/13/2020



We've made every effort to ensure the accuracy of this book and its companion content. Any errors that have been confirmed since this book was published can be downloaded below.

Download the errata (44 KB .doc)

Submit Errata

More Information

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information

To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.


Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.


If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information

Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.


This site is not directed to children under the age of 13.


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information

If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information

Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents

California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure

Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact

Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice

We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020