{"id":358,"date":"2015-08-03T21:05:45","date_gmt":"2015-08-03T21:05:45","guid":{"rendered":"https:\/\/courses.candelalearning.com\/computerapps\/?post_type=chapter&#038;p=358"},"modified":"2016-04-25T20:19:26","modified_gmt":"2016-04-25T20:19:26","slug":"tutorials-computer-security","status":"publish","type":"chapter","link":"https:\/\/courses.lumenlearning.com\/sanjacinto-computerapps\/chapter\/tutorials-computer-security\/","title":{"raw":"Tutorials: Computer Security","rendered":"Tutorials: Computer Security"},"content":{"raw":"<img class=\"size-thumbnail wp-image-1209 alignright\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images-archive-read-only\/wp-content\/uploads\/sites\/1319\/2016\/03\/11203545\/information-160885_1280-150x150.png\" alt=\"Information symbol of the blue i with a circle around it.\" width=\"150\" height=\"150\" \/>View the following <a href=\"http:\/\/www.atomiclearning.com\/pc_cleansecure\" target=\"_blank\">Atomic Learning Tutorials at Atomic Learning<\/a> (TOOLS menu\u2013ATOMIC LEARNING \u2013 search on COMPUTER SECURITY \u2013 select PC Security &amp; Maintenance )\r\n\r\nB. MALWARE and OTHER THREATS\r\n<ul>\r\n\t<li>Defining Malware<\/li>\r\n\t<li>Preventing Malware<\/li>\r\n<\/ul>\r\nC. PC PROTECTION\r\n<ul>\r\n\t<li>Protecting your Windows 7 PC with Microsoft PC Security Essentials<\/li>\r\n\t<li>Protecting your Windows 8 System<\/li>\r\n<\/ul>\r\nD. Firewalls \u2013 ALL\r\n\r\nG. Home Network Security - ALL\r\n\r\nTo access these trainings, <a href=\"https:\/\/www.nvcc.edu\/ithd\/students\/training.html\" target=\"_blank\">follow the instructions from NVCC<\/a>.","rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-thumbnail wp-image-1209 alignright\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images-archive-read-only\/wp-content\/uploads\/sites\/1319\/2016\/03\/11203545\/information-160885_1280-150x150.png\" alt=\"Information symbol of the blue i with a circle around it.\" width=\"150\" height=\"150\" \/>View the following <a href=\"http:\/\/www.atomiclearning.com\/pc_cleansecure\" target=\"_blank\">Atomic Learning Tutorials at Atomic Learning<\/a> (TOOLS menu\u2013ATOMIC LEARNING \u2013 search on COMPUTER SECURITY \u2013 select PC Security &amp; Maintenance )<\/p>\n<p>B. MALWARE and OTHER THREATS<\/p>\n<ul>\n<li>Defining Malware<\/li>\n<li>Preventing Malware<\/li>\n<\/ul>\n<p>C. PC PROTECTION<\/p>\n<ul>\n<li>Protecting your Windows 7 PC with Microsoft PC Security Essentials<\/li>\n<li>Protecting your Windows 8 System<\/li>\n<\/ul>\n<p>D. Firewalls \u2013 ALL<\/p>\n<p>G. Home Network Security &#8211; ALL<\/p>\n<p>To access these trainings, <a href=\"https:\/\/www.nvcc.edu\/ithd\/students\/training.html\" target=\"_blank\">follow the instructions from NVCC<\/a>.<\/p>\n\n\t\t\t <section class=\"citations-section\" role=\"contentinfo\">\n\t\t\t <h3>Candela Citations<\/h3>\n\t\t\t\t\t <div>\n\t\t\t\t\t\t <div id=\"citation-list-358\">\n\t\t\t\t\t\t\t <div class=\"licensing\"><div class=\"license-attribution-dropdown-subheading\">CC licensed content, Original<\/div><ul class=\"citation-list\"><li>Introduction to Computer Applications and Concepts Computer Security Tutorials. <strong>Authored by<\/strong>: Jim Shannon. <strong>Provided by<\/strong>: Extended Learning Institute (ELI), Northern Virginia Community College (NOVA). <strong>Located at<\/strong>: <a target=\"_blank\" href=\"http:\/\/eli.nvcc.edu\/\">http:\/\/eli.nvcc.edu\/<\/a>. <strong>License<\/strong>: <em><a target=\"_blank\" rel=\"license\" href=\"https:\/\/creativecommons.org\/licenses\/by\/4.0\/\">CC BY: Attribution<\/a><\/em><\/li><\/ul><div class=\"license-attribution-dropdown-subheading\">Public domain content<\/div><ul class=\"citation-list\"><li>Image of blue i. <strong>Authored by<\/strong>: OpenClipArtVectors. <strong>Located at<\/strong>: <a target=\"_blank\" href=\"https:\/\/pixabay.com\/en\/information-circle-icon-blue-160885\/\">https:\/\/pixabay.com\/en\/information-circle-icon-blue-160885\/<\/a>. <strong>License<\/strong>: <em><a target=\"_blank\" rel=\"license\" href=\"https:\/\/creativecommons.org\/about\/cc0\">CC0: No Rights Reserved<\/a><\/em><\/li><\/ul><\/div>\n\t\t\t\t\t\t <\/div>\n\t\t\t\t\t <\/div>\n\t\t\t <\/section>","protected":false},"author":74,"menu_order":10,"template":"","meta":{"_candela_citation":"[{\"type\":\"original\",\"description\":\"Introduction to Computer Applications and Concepts Computer Security Tutorials\",\"author\":\"Jim Shannon\",\"organization\":\"Extended Learning Institute (ELI), Northern Virginia Community College (NOVA)\",\"url\":\"http:\/\/eli.nvcc.edu\/\",\"project\":\"\",\"license\":\"cc-by\",\"license_terms\":\"\"},{\"type\":\"pd\",\"description\":\"Image of blue i\",\"author\":\"OpenClipArtVectors\",\"organization\":\"\",\"url\":\"https:\/\/pixabay.com\/en\/information-circle-icon-blue-160885\/\",\"project\":\"\",\"license\":\"cc0\",\"license_terms\":\"\"}]","CANDELA_OUTCOMES_GUID":"","pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"class_list":["post-358","chapter","type-chapter","status-publish","hentry"],"part":336,"_links":{"self":[{"href":"https:\/\/courses.lumenlearning.com\/sanjacinto-computerapps\/wp-json\/pressbooks\/v2\/chapters\/358","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/courses.lumenlearning.com\/sanjacinto-computerapps\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/courses.lumenlearning.com\/sanjacinto-computerapps\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/sanjacinto-computerapps\/wp-json\/wp\/v2\/users\/74"}],"version-history":[{"count":8,"href":"https:\/\/courses.lumenlearning.com\/sanjacinto-computerapps\/wp-json\/pressbooks\/v2\/chapters\/358\/revisions"}],"predecessor-version":[{"id":1353,"href":"https:\/\/courses.lumenlearning.com\/sanjacinto-computerapps\/wp-json\/pressbooks\/v2\/chapters\/358\/revisions\/1353"}],"part":[{"href":"https:\/\/courses.lumenlearning.com\/sanjacinto-computerapps\/wp-json\/pressbooks\/v2\/parts\/336"}],"metadata":[{"href":"https:\/\/courses.lumenlearning.com\/sanjacinto-computerapps\/wp-json\/pressbooks\/v2\/chapters\/358\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/courses.lumenlearning.com\/sanjacinto-computerapps\/wp-json\/wp\/v2\/media?parent=358"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/sanjacinto-computerapps\/wp-json\/pressbooks\/v2\/chapter-type?post=358"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/sanjacinto-computerapps\/wp-json\/wp\/v2\/contributor?post=358"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/sanjacinto-computerapps\/wp-json\/wp\/v2\/license?post=358"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}