Cybersecurity Foundations Training Course
Home > Art, Film & Photography > Cybersecurity Foundations Training Course
Cybersecurity Foundations Training Course

Cybersecurity Foundations Training Course


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

Prepare yourself for a career in cybersecurity with this self-paced online training course. In 26 hours of targeted lessons, expert trainer Omar Santos will help you learn cybersecurity fundamentals. You’ll also enhance your resume with hands-on experience completing pen testing and ethical hacking guided labs. Each lesson builds on the next, and flashcards and quizzes are provided to help you master key topics. Who should take this course Skill level | Beginner Anyone interested in a career in cybersecurity Anyone interested in learning the fundamentals of security and networking Anyone looking for hands-on training with pen testing and ethical hacking Course participants should have a basic knowledge of IT and be comfortable working with a computer. For an optimal course experience, we recommend using these browsers and devices. Course includes 26 hours of expert-led training videos to watch and learn at your own pace Hands-on labs that demonstrate completing tasks in real time to simulate real-world experience with essential cybersecurity tasks Self-study tools, such as flashcards to master key terms, and quizzes to self-assess your progress 1 year of access* What you'll learn This Pearson IT Training Course provides a complete learning path to build your skills as a cybersecurity professional. Topics covered include the following: Networking and Security Basics Cybersecurity Management, Monitoring, and Analysis Network Security Telemetry Digital Forensics and Incident Response (DFIR) Fundamentals of Ethical Hacking and Penetration Testing Advanced Wireless Hacking and Penetration Testing Mobile Device Security Internet of Things (IoT) Security *Retake guarantee Didn't pass your certification exam on your first try? We'll give you six months of additional access at no cost. About Pearson IT Training Courses Pearson IT Training Courses are complete and affordable packages of expert-led, self-paced courses designed to help you stand out with in-demand skills that take your career to the next level. From learning to hands-on practice and application, our comprehensive certification prep courses ensure you are ready for exam success.

Table of Contents:
Cybersecurity Foundations Introduction Introduction Module 1: Networking and Security Basics Lesson 1: Networking Fundamentals Learning objectives Reviewing the OSI Model Reviewing the TCP/IP Network Models Surveying Common Networking Protocols: DHCP Surveying Common Networking Protocols: Routing Protocols Surveying Common Networking Protocols: ICMP Surveying Common Networking Protocols: DNS Identifying Networking Device Types Understanding IP SubnetsExamining VLANs and Data Visibility Examining VLANs and Data Visibility Lesson 2: Security Principles Learning objectives Understanding Defense-in-Depth Identifying Threats, Vulnerabilities, and Exploits and Their Associated Risk Identifying Threat Actors Understanding Reverse Engineering Understanding Chain of Custody Examining Run Books Introducing PII and PHI Understanding Principle of Least Privilege Performing Risk Assessment Lesson 2: Flashcards Lesson 2: Quiz Lesson 3: Access Control Models Learning objectives Understanding Confidentiality, Integrity, and Availability Understanding Authentication, Authorization, and Accounting Examining the Access Control Process: Terminology and Data Classification Examining the Access Control Process: Data States and Policy Roles Lab: Viewing the Windows File Registry Examining the Access Control Process: Security and Access Control Classification Understanding Discretionary Access Control Understanding Mandatory Access Control Understanding Role Based Access Control Understanding Attribute Based Access Control Lesson 3: Flashcards Lesson 3: Quiz Lesson 4: Fundamentals of Cryptography and PKI Learning objectives Understanding the Basic Components of Cryptography Introducing Public Key Infrastructure Deciphering Encryption Algorithms Understanding Hashing Algorithms Lab: Applying Symmetric Key Encryption Examining Secure Socket Layer and Transport Layer Security Lab: Configuring a Switch to Learn its IP Address with DHCP Examining Digital Certificates Lesson 4: Flashcards Lesson 4: Quiz Lesson 5: Introduction to Virtual Private Networks (VPNs) Learning objectives Introducing VPNs and Why We Use Them Examining Remote Access VPNs Lab: Generating a Symmetric Key Examining Site-to-Site VPNs Understanding IPsec Concepts, Components, and Operations Lab: Using Dig for Passive Reconnaissance Lab: Using Social Engineering Techniques to Plan an Attack Lab: Attacking a Website Using XSS Injection Surveying Cisco VPN Solutions: Traditional IPsec, DMVPN, FlexVPN Surveying Cisco VPN Solutions: Clientless SSL and AnyConnect Lab: Configuring Clientless SSL VPNs on ASDM Lesson 5: Flashcards Lesson 5: Quiz Lesson 6: Endpoint Security Technologies Learning objectives Examining Host-Based Intrusion Detection Exploring Antimalware and Antivirus Understanding Host-based Firewalls Lab: Using Uncomplicated Firewall (UFW) Exploring Application-level Whitelisting/Blacklisting Exploring Systems-based Sandboxing Lesson 6: Flashcards Lesson 6: Quiz Lesson 7: Types of Attacks and Vulnerabilities Learning objectives Surveying Types of Vulnerabilities Understanding Passive Reconnaissance and Social Engineering Understanding Active Reconnaissance Port Scanning and Host Profiling Understanding Privilege Escalation and Code Execution Attacks Understanding Backdoors and Man-in-the Middle Attacks Understanding Denial of Service Attacks Surveying Attack Methods for Data Exfiltration Understanding ARP Cache Poisoning and Route Manipulation Attacks Understanding Password Attacks Understanding Wireless Attacks Exploring Security Evasion Techniques Lab: Configuring a BPDU Guard and Implementing Port Security Lesson 7: Flashcards Lesson 7: Quiz Lesson 8: Threat Analysis Learning objectives Understanding Risk Analysis Understanding the Common Vulnerability Scoring System (CVSS) Interpreting Malware Analysis Tool Output Lab: Using the theHarvester Tool Lesson 8: Flashcards Lesson 8: Quiz Module 2: Cybersecurity Management, Monitoring, and Analysis Lesson 9: Introduction to Security Management Learning objectives Surveying Asset Management Surveying Configuration Management Surveying Mobile Device Management Surveying Patch Management Lab: Configuring Inbound Rules for a Firewall Lab: Installing And Using Nfdump Surveying Vulnerability Management Understanding Network and Host Antivirus Lab: Performing Active Reconnaissance Understanding SEIM and Log Collection Lesson 9: Flashcards Lesson 9: Quiz Lesson 10: Windows, Linux, and MAC OS X Based Analysis Learning objectives Understanding Windows Forensics Basics Understanding Linux and MAC OS X Forensics Basics Lab: Viewing and Changing File Permissions Lab: Viewing Processes in Linux (Background+ Foreground) Examining Web Server Logs Lab: Enabling and Disabling VLANs on a Switch Lesson 10: Flashcards Lesson 10: Quiz Lesson 11: Network and Host Telemetry Learning objectives Introducing NetFlow Surveying Commercial and Open Source NetFlow Tools Understanding Flexible NetFlow Examining Firewall Logs Understanding Application Visibility and Control Examining Web and Email Content Filtering Logs Lab: Performing Reconnaissance on a Network Exploring Full Packet Capture Surveying IPS Events Surveying Host or Endpoint Events Lesson 11: Flashcards Lesson 11: Quiz Module 3: Network Security Telemetry Lesson 12: Introduction to NetFlow and IPFIX Learning objectives Introduction to NetFlow Lab: Implementing IPsec VPNs through CLI Lab: Configuring NetFlow and NetFlow Data Export The Attack Continuum The Network as a Sensor and as an Enforcer What Is a Flow? NetFlow Versus IP Accounting and Billing NetFlow for Network Security Traffic Engineering and Network Planning Introduction to IP Flow Information Export (IPFIX) Cisco Supported Platforms for NetFlow NetFlow Versions and History Lesson 13: NetFlow Deployment Scenarios Learning objectives Introduction to Cisco Cyber Threat Defense Deployment Scenario: User Access Layer Deployment Scenario: Wireless LAN Deployment Scenario: Internet Edge Deployment Scenario: Data Center Deployment Scenario: NetFlow in Site-to-Site and Remote VPNs NetFlow Collection Considerations and Best Practices Determining the Flows per Second and Scalability Lesson 13: Flashcards Lesson 13: Quiz Lesson 14: NetFlow Commercial and Open Source Monitoring and Analysis Software Packages Learning objectives Commercial NetFlow Monitoring and Analysis Software Packages NFdump NfSen Lab: Using OpenSSL to Create a Public/Private Key Pair Lab: Generating an Asymmetric Key SiLK Elasticsearch, Logstash, and Kibana Stack (ELK): Overview and Architecture Lab: Installing Logstash and Kibana ELK: Installation and Configuration Files Lesson 14: Flashcards Lesson 14: Quiz Module 4: Digital Forensics and Incident Response (DFIR) Lesson 15: Forensics Learning objectives Examining Types of Evidence Surveying Windows Forensics: Application Processes, Threads, and Vulnerabilities Surveying Windows Forensics: Memory Surveying Windows Forensics: The Windows Registry Surveying Windows Forensics: Hard Drives, FAT, and NTFS Surveying Linux Forensics Understanding Evidence Collection Handling Evidence Examining Asset and Threat Actor Attribution Lesson 15: Flashcards Lesson 15: Quiz Lesson 16: Intrusion Analysis Learning objectives Introducing Intrusion Analysis Fundamentals Examining Packet Captures Examining Protocol Headers Analyzing Security Device Data Differentiating False Positives, False Negatives, True Positives, and True Negatives Lesson 16: Flashcards Lesson 16: Quiz Lesson 17: Introduction to Incident Response Learning objectives Scoping the Incident Response Plan and Process Understanding Information Sharing and Coordination Lab: Using Burpsuite Identifying the Incident Response Team Structure Lesson 17: Flashcards Lesson 17: Quiz Lesson 18: Incident Response Teams Learning objectives Analyzing Computer Incident Response Teams (CSIRTs) Analyzing Product Security Incident Response Teams (PSIRTs) Surveying Coordination Centers Analyzing Managed Security Service Providers Incident Response Teams Lesson 18: Flashcards Lesson 18: Quiz Lesson 19: Network and Host Profiling Learning objectives Understanding Network Profiling Lab: Using Kismet Understanding Host Profiling Lesson 19: Flashcards Lesson 19: Quiz Lesson 20: Data and Event Analysis Learning objectives Understanding Data Normalization Deconstructing Universal Data Formats Understanding the 5-tuple Correlation Performing DNS Analysis Lab: Using Maltego Performing Web Log Analysis Performing Deterministic and Probabilistic Analysis Lab: Exploiting a Website Using SQL Injection Lesson 20: Flashcards Lesson 20: Quiz Lesson 21: Intrusion Event Categories Learning objectives Identifying and Mitigating Reconnaissance Identifying and Mitigating Weaponization Identifying and Mitigating Delivery Identifying and Mitigating Exploitation Identifying and Mitigating Installation Identifying and Mitigating Command and Control Understanding Action on Objectives Lesson 21: Flashcards Lesson 21: Quiz Lesson 22: The Incident Handling Process Learning objectives Introducing the Vocabulary for Event Recording and Incident Sharing (VERIS) Applying the VERIS Schema to Incident Handling Surveying the VERIS Incident Recording Tool and Other VERIS Resources Lab: Grabbing a Screenshot of a Target Machine Using Metasploit Lesson 22: Flashcards Lesson 22: Quiz Module 5: Fundamentals of Ethical Hacking and Penetration Testing Lesson 23: Overview of Ethical Hacking and Penetration Testing Learning objectives Introducing Ethical Hacking and Pen Testing Getting Started with Ethical Hacking and Pen Testing Understanding the Legal Aspects of Penetration Testing Lab: Observing an SHA-Generated Hash Value Exploring Penetration Testing Methodologies Lab: Configuring DHCP Snooping Exploring Penetration Testing and other Cyber Security Certifications Building Your Own Lab: Overview Building Your Own Lab: VIRL and Operating System Software Understanding Vulnerabilities, Threats, and Exploits Understanding the Current Threat Landscape Lesson 23: Flashcards Lesson 23: Quiz Lesson 24: Passive Reconnaissance Learning objectives Understanding Passive Reconnaissance Exploring Passive Reconnaissance Methodologies: Discovering Host and Port Information Exploring Passive Reconnaissance Methodologies: Searching for Files Exploring Passive Reconnaissance Methodologies: Searching for Names, Passwords, and Sensitive Information Lab: Enabling a Keylogger in a Target Machine Surveying Essential Tools for Passive Reconnaissance: SpiderFoot, theHarvester, and Discover Lab: Managing NTFS Permissions Surveying Essential Tools for Passive Reconnaissance: Recon-ng Lesson 24: Flashcards Lesson 24: Quiz Lesson 25: Active Reconnaissance Learning objectives Understanding Active Reconnaissance Exploring Active Reconnaissance Methodologies from an Ethical Hacker Perspective Surveying Essential Tools for Active Reconnaissance: Port Scanning and Web Service Review Lab: Simulating a DoS Attack Surveying Essential Tools for Active Reconnaissance: Network and Web Vulnerability Scanners Lesson 25: Flashcards Lesson 25: Quiz Lesson 26: Hacking Web Applications Learning objectives Understanding Web Applications Understanding Web Architectures Uncovering Web Vulnerabilities Testing Web Applications: Methodology Lab: Configuring Site-to-Site IPsec VPN Topology Testing Web Applications: Reconnaissance Testing Web Applications: Mapping Lab: Get settings and information about ports of TCP Testing Web Applications: Vulnerability Discovery Understanding the Exploitation of Web Applications Surveying Defenses to Mitigate Web Application Hacking Lesson 26: Flashcards Lesson 26: Quiz Lesson 27: Hacking Networking Devices Learning objectives Understanding the Reasons for and the Steps to Hacking a Network Reviewing Networking Technology Fundamentals: OSI and DoD Internet Models Reviewing Networking Technology Fundamentals: Forwarding Device Architecture and Communication Building an Internetwork Topology Using VIRL Hacking Switches: Reviewing Ethernet Fundamentals Hacking Switches: Demo Hacking Switches: ARP Vulnerabilities and ARP Cache Poisoning Reviewing Router Fundamentals Examining ICMP, First Hop Redundancy and Routing Protocol Attacks Hacking the Management Plane Understanding Firewall Fundamentals and Levels of Inspection Performing Firewall Reconnaissance and Tunneling Lab: Using the traceroute Command Surveying Essential Tools for Hacking Network Devices: Packet Capture Surveying Essential Tools for Hacking Network Devices: Switch and Router Hacking Tools Surveying Essential Tools for Hacking Network Devices: ARP Spoofing Tools Surveying Essential Tools for Hacking Network Devices: MiTM Tools Surveying Essential Tools for Hacking Network Devices: Linux Tools Using Network Device Hacking Tools to Perform a MiTM Attack Lesson 27: Flashcards Lesson 27: Quiz Lesson 28: Fundamentals of Wireless Hacking Learning objectives Reviewing Wireless Technology Fundamentals Surveying Wireless Hacking Tools: Wireless Adapters Surveying Wireless Hacking Tools: Software Hacking WEP, WPA, and Other Protocols Understanding Hacking Wireless Clients Lesson 28: Flashcards Lesson 28: Quiz Lesson 29: Buffer Overflows Learning objectives Understanding Buffer Overflows Exploiting Buffer Overflows Overcoming Defenses for Buffer Overflow Vulnerabilities Understanding Fuzzing Creating a Fuzzing Strategy Exploring Mutation-based, Generation-based, and Evolutionary Fuzzers Surveying Tools to Find and Exploit Buffer Overflows Lesson 29: Flashcards Lesson 29: Quiz Lesson 30: Hacking User Credentials Learning objectives Understanding Authentication and Authorization Mechanisms Understanding Authentication and Authorization Attacks Exploring Password Storage Mechanisms Lab: Configuring VLANs Understanding Password Storage Vulnerability Lab: Simulating an Eavesdropping Attack Using Wireshark Cracking Passwords with John the Ripper Cracking Passwords with hashcat Lab: Finding the Physical Address of a LAN Adapter Lab: Using Python for Penetration Testing Improving Password Security Lab: Detecting Rootkits Lesson 30: Flashcards Lesson 30: Quiz Lesson 31: Social Engineering Learning objectives Understanding Social Engineering Exploring the Social Engineering Toolkit (SET) Exploring Maltego Lab: Creating a Demilitarized Zone Surveying Social Engineering Case Studies Lab: Using Nikto Lesson 31: Flashcards Lesson 31: Quiz Lesson 32: Writing Penetration Testing Reports Learning objectives Understanding Pen Test Reports and How They Are Used Planning and Organizing Your Report Understanding the Pen Test Report Format Lab: Using Netcraft Lab: Capturing and Exporting Data from Network Traffic Captured Using Wireshark Exploring Risk Ratings Lab: Using Ettercap for ARP Spoofing Lab: Using OWASP ZAP Lab: Making Syslog Entries Readable Distributing Pen Test Reports Lesson 32: Flashcards Lesson 32: Quiz Module 6: Advanced Wireless Hacking and Penetration Testing Lesson 33: Wireless Client Attacks Learning objectives Understanding Wireless Client Attacks and Their Motives Learning Packet Injection Attacks Eavesdropping and Manipulating Unencrypted Wi-Fi Communications Attacking Publicly Secure Packet Forwarding (PSPF) Lab: Obtaining Information about UDP Settings, Configurations, and Ports Lab: Creating a Personal Linux Firewall Using Iptables Attacking the Preferred Network List (PNL) Lesson 33: Flashcards Lesson 33: Quiz Lesson 34: Building Your Lab and Attack Hardware Learning objectives Understanding Wireless Antennas Surveying Wi-Fi Devices Like the Pinneaple Building Your Own Lab Lesson 34: Flashcards Lesson 34: Quiz Lesson 35: Aircrack-ng Learning objectives Introducing the Aircrack-ng Suite Introducing Airmon-ng Understanding Airodump-ng Lab: Configuring an SSL Cisco AnyConnect Secure Mobility Client VPN Introducing Aireplay-ng Lab: Installing Antivirus Software Introducing Airdecap-ng Introducing Airserv-ng Introducing Airtun-ng Lesson 35: Flashcards Lesson 35: Quiz Lesson 36: Cracking WEP Learning objectives Understanding WEP Fundamentals Learning How to Crack WEP Lab: Cracking a Linux Password Using John the Ripper Lab: Using Nmap for Network Enumeration Lesson 36: Flashcards Lesson 36: Quiz Lesson 37: Hacking WPA Learning objectives Understanding WPA Fundamentals Surveying Attacks Against WPA2-PSK Networks Using coWPAtty Using Pyrit Lab: Configuring Static Routing Exploring WPA Enterprise Hacking Lesson 37: Flashcards Lesson 37: Quiz Lesson 38: Performing Wireless Reconnaissance Learning objectives Using Kismet Using Wireshark Lab: Getting Information about DNS Learning How to Hack Default Configurations Lab: Using nslookup for Passive Reconnaissance Lesson 38: Flashcards Lesson 38: Quiz Lesson 39: Evil Twins and Rogue Access Points Learning objectives Defining Evil Twin Attacks Performing Evil Twin Attacks Using Karmetasploit Lab: Using the show ip route Command Exploring the WiFi Pineapple Lesson 39: Flashcards Lesson 39: Quiz Module 7: Mobile Device Security Lesson 40: Mobile Device Security Learning objectives Understanding OWASP Mobile Device Vulnerabilities Wrestling with the BYOD Dilemma Understanding Mobile Device Management (MDM) Lab: Testing Connectivity Using the Ping Command Understanding Mobile Device Security Policies Lesson 40: Flashcards Lesson 40: Quiz Lesson 41: Hacking Android Devices Learning objectives Exploring The Android Security Model Exploring Android Emulators and SDK Understanding Android Hacking Tools and Methodologies Lab: Performing an Intense Scan in Zenmap Lesson 41: Flashcards Lesson 41: Quiz Lesson 42: Hacking iOS Devices Learning objectives Introducing iOS Security Exploring Jailbraking iOS Surveying Tools for Dissasembling iOS Applications Lesson 42: Flashcards Lesson 42: Quiz Module 8: Internet of Things (IoT) Security Lesson 43: Hacking IoT Devices Learning objectives Surveying Tools for Dissasembling iOS Applications Exploring ZigBee and IEEE 802.15.4 Exploring INSTEON Exploring ZWave Exploring LoRA Lesson 43: Flashcards Lesson 43: Quiz Lesson 44: Attacking Bluetooth Learning objectives Understanding Bluetooth Vulnerabilities Surveying Tools for Bluetooth Monitoring Lesson 44: Flashcards Lesson 44: Quiz Lesson 45: Attacking NFC Learning objectives Understanding NFC Vulnerabilities Exploring NFC Attacks and Case Studies Lab: Using ProDiscover Basic Lesson 45: Flashcards Lesson 45: Quiz

About the Author :
Course expert Omar Santos - Best-selling author, expert trainer, and Principal Engineer at Cisco (PSIRT) Omar is the author of over 20 books and video courses, as well as numerous white papers, articles, and security configuration guidelines and best practices. Omar is a principal engineer of the Cisco Product Security Incident Response Team (PSIRT), where he mentors and leads engineers and incident managers during the investigation and resolution of cyber security vulnerabilities. Additional information about Omar’s current projects can be found at omarsantos.io and you can follow Omar on Twitter @santosomar. Ron Taylor - Author, Speaker, and Cisco Security Architect Ron Taylor has been in the Information Security field for over 20 years working in various areas focusing on both offense and defensive security roles. Ten of those years were spent in consulting. In 2008, he joined the Cisco Global Certification Team as an SME in Information Assurance. In 2012, he moved into a position with the Security Research & Operations group, where his focus was mostly on penetration testing of Cisco products and services. He was also involved in developing and presenting security training to internal development and test teams globally. Additionally, he provided consulting support to many product teams as an SME on product security testing. He then spent some time as an Incident Manager for the Cisco Product Security Incident Response Team (PSIRT). His current role is a Security Architect specializing in Cisco’s security product line. He has held a number of industry certifications including GPEN, GWEB, GCIA, GCIH, GWAPT, RHCE, CCSP, CCNA, CISSP, Pentest+ and MCSE. Ron has also authored books and video courses, teaches, and is involved in organizing a number of cybersecurity conferences including the Bsides Raleigh, Texas Cyber Summit, Grayhat and the Red Team Village at DEFCON. His Twitter handle is @Gu5G0rman. You can also find him on LinkedIn. Jon Sternstein - Award-winning cybersecurity expert, consultant, and instructor Jon Sternstein is the Founder/Principal of Stern Security, the cybersecurity company behind Velocity, the internal and vendor risk management platform velocitysec.com. He holds many security certifications, including GPEN, CISSP, and Certified Ethical Hacker. Jon has been a featured cybersecurity expert on ABC News, WRAL News, and CBS News, as well as in ISSA Journal, PenTest Magazine, and Business North Carolina Magazine. Stern Security’s website is sternsecurity.com. Chris McCoy - CCIE certified advanced security expert and instructor Chris McCoy is a principal security research engineer in Cisco's Advanced Security Initiatives Group (ASIG). He has over 25 years of experience in the networking and security industry. He has a passion for computer security, finding flaws in mission-critical systems, and designing mitigations to thwart motivated and resourceful adversaries. He was formerly with Spirent Communications and the U.S. Air Force. Chris is CCIE certified (Emeritus #11801) in the Routing & Switching and Service Provider tracks, which he has held for over 10 years. His Twitter handle is @chris_mccoy.


Best Sellers


Product Details
  • ISBN-13: 9780137513703
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Pearson IT Certification
  • Language: English
  • ISBN-10: 0137513704
  • Publisher Date: 16 Apr 2021
  • Binding: Digital online


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Cybersecurity Foundations Training Course
Pearson Education (US) -
Cybersecurity Foundations Training Course
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Cybersecurity Foundations Training Course

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!