IT Glossary - C - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Caching

The process of storing data in a cache, a temporary storage area. Caching allows for the fast retrieval of data, which might otherwise take longer to fetch from the primary storage location. It is widely used in various computing environments to improve application performance and efficiency, from web browsers storing web pages to cloud services and database systems.

You will find this term commonly used in General IT, Software Development

Capacity Planning

The process of determining the production capacity needed by an organization to meet changing demands for its products. In IT, capacity planning involves predicting computing resources required over time to ensure adequate infrastructure performance and efficiency.

You will find this term commonly used in IT Management, Infrastructure

CCNA (Cisco Certified Network Associate)

Validates the ability to install, configure, operate, and troubleshoot medium-size routed and switched networks.

You will find this term commonly used in Networking

CCNP (Cisco Certified Network Professional)

Advanced networking certification that covers in-depth networking concepts and protocols, beyond the CCNA level.

You will find this term commonly used in Networking

CDN (Content Delivery Network)

A geographically distributed network of proxy servers and their data centers. The goal is to provide high availability and performance by distributing the service spatially relative to end-users. CDNs serve a large portion of the Internet content today, including web objects (text, graphics, and scripts), downloadable objects (media files, software, documents), applications (e-commerce, portals), live streaming media, on-demand streaming media, and social networks.

You will find this term commonly used in Networking, Web Development

CEH (Certified Ethical Hacker)

Demonstrates the ability to find vulnerabilities in computer systems and to prevent hacking.

You will find this term commonly used in Ethical Hacking, Cybersecurity

Certified Blockchain Professional (CBP)

Focuses on the in-depth understanding of blockchain technology and its implementation in real-world scenarios.

You will find this term commonly used in Blockchain

Certified Cloud Security Professional (CCSP)

Focuses on cloud security architecture, design, operations, and service orchestration, provided by (ISC)².

You will find this term commonly used in Cloud Security

Certified Data Professional (CDP)

Offered by the Institute for Certification of Computing Professionals (ICCP), it covers various domains in data management and analytics.

You will find this term commonly used in Data Management, Analytics

Certified Ethical Hacker Master (CEH Master)

Combines the CEH certification with a practical exam that tests the skills in a real-world scenario.

You will find this term commonly used in Cybersecurity, Ethical Hacking

Certified Information Privacy Manager (CIPM)

Offered by the International Association of Privacy Professionals (IAPP), it focuses on managing and navigating privacy in organizations.

You will find this term commonly used in Data Privacy, Compliance

Certified Information Privacy Professional (CIPP)

Offered by the International Association of Privacy Professionals (IAPP), it demonstrates understanding of global privacy and data protection laws and practices.

You will find this term commonly used in Privacy, Data Protection

Certified Kubernetes Administrator (CKA)

Demonstrates the ability to design, build, configure, and expose cloud native applications for Kubernetes, a container-orchestration system.

You will find this term commonly used in Containerization, Cloud Computing

Certified Scrum Product Owner (CSPO)

Focuses on scrum leadership and responsibility in product development to maximize value.

You will find this term commonly used in Agile Development, Product Management

Certified ScrumMaster (CSM)

Validates knowledge of the Scrum methodology and its application in project management and software development.

You will find this term commonly used in Agile Development, Project Management

Certified SonicWall Security Administrator (CSSA)

Validates knowledge in deploying and managing SonicWall firewall appliances and security solutions.

You will find this term commonly used in Network Security

Certified Wireless Network Administrator (CWNA)

Validates the knowledge of wireless network administration, focusing on network security, troubleshooting, and RF fundamentals.

You will find this term commonly used in Networking, Wireless Technologies

CGEIT (Certified in the Governance of Enterprise IT)

Focuses on the governance of IT to support the enterprise in achieving its goals.

You will find this term commonly used in IT Governance

Change Management

The process, tools, and techniques used to manage the people side of change to achieve the required business outcome. In IT, change management involves the systematic approach to dealing with the transition or transformation of IT services, processes, or applications, ensuring that changes are smoothly and successfully implemented to minimize impact on services.

You will find this term commonly used in IT Management

Chatbot

A software application used to conduct an on-line chat conversation via text or text-to-speech, in lieu of providing direct contact with a live human agent. Designed to convincingly simulate the way a human would behave as a conversational partner, chatbots are typically used in dialog systems for various practical purposes including customer service or information acquisition.

You will find this term commonly used in AI, Customer Service

CI/CD (Continuous Integration/Continuous Deployment)

Practices in software development designed to improve software quality and expedite the development process. CI involves automating the integration of code changes from multiple contributors into a single software project. CD automates the delivery of applications to selected infrastructure environments. Both practices enable developers to release new changes to customers faster and more safely.

You will find this term commonly used in Software Development

Circuit Switching

A method of implementing a telecommunications network in which a dedicated communication path is established between two nodes for the duration of a communication session. Historically used for traditional telephone networks, circuit switching ensures a constant rate of transmission but is less efficient than packet switching for data.

You will find this term commonly used in Networking, Telecommunications

CISA (Certified Information Systems Auditor)

Recognized as a standard for those who audit, control, monitor, and assess an organization’s information technology and business systems.

You will find this term commonly used in IT Audit, Control

Cisco

Known for its networking and infrastructure certifications, ranging from entry-level to expert in areas such as networking, security, and collaboration technologies.

You will find this term commonly used in Networking, Security

Cisco Certified CyberOps Associate

Focuses on the skills required for cybersecurity operations, including knowledge of security concepts, monitoring, host-based analysis, network intrusion analysis, and security policies and procedures.

You will find this term commonly used in Cybersecurity

Cisco Certified Internetwork Expert (CCIE)

Cisco’s highest certification level, validating expert-level skills in network engineering, including design, build, and troubleshooting complex networks.

You will find this term commonly used in Networking

Cisco DevNet Associate

Validates the skills of software developers, DevOps engineers, automation specialists, and other software professionals who develop and maintain applications built on Cisco platforms.

You will find this term commonly used in Network Engineering, Software Development

Cisco Packet Tracer

A cross-platform visual simulation tool designed by Cisco Systems that allows users to create network topologies and imitate modern computer networks.

You will find this term commonly used in Networking, Education

CISM (Certified Information Security Manager)

Focuses on management and governance of information security programs.

You will find this term commonly used in Information Security Management

CISSP (Certified Information Systems Security Professional)

A globally recognized certification in the field of IT security offered by (ISC)². The CISSP designation signifies expertise in designing, implementing, and managing a best-in-class cybersecurity program.

You will find this term commonly used in Security, Cybersecurity

CIW (Certified Internet Web Professional)

A series of certifications for skills related to web development and design.

You will find this term commonly used in Web Development

CLI (Command Line Interface)

A text-based user interface used to view and manage computer files. By typing commands at the prompt, users can perform tasks on a computer without the use of a graphical user interface (GUI). This interface enables more efficient and precise control of the operating system and software applications, often preferred by more advanced users for certain tasks.

You will find this term commonly used in Software Development, General IT

Client-Server Model

A distributed application structure that partitions tasks or workloads between the providers of a resource or service, called servers, and service requesters, called clients. This model is one of the central ideas of network computing, and many applications use it to communicate over a network.

You will find this term commonly used in Networking

Cloud Access Security Broker (CASB)

A software tool or service that sits between an organization's on-premise infrastructure and cloud providers to enforce security policies as cloud-based resources are accessed. CASBs give organizations visibility into and control over their data in the cloud, helping to ensure compliance and protect against threats.

You will find this term commonly used in Security, Cloud Computing

Cloud Application Management Interface (CAMI)

A standardized interface that allows for the management of applications deployed in cloud environments. CAMI enables developers and administrators to interact with cloud-based applications for tasks such as deployment, scaling, and monitoring.

You will find this term commonly used in Cloud Computing, Software Development

Cloud Application Migration

The process of moving applications, data, and workloads from on-premise data centers or other cloud environments to a cloud platform. Migration strategies must consider compatibility, performance, and security implications to ensure seamless operation and accessibility of applications in the cloud.

You will find this term commonly used in Cloud Computing, Application Management

Cloud Application Programming Interface (API)

A set of programming instructions and standards for accessing a web-based software application or web tool. Cloud APIs allow software to request data from services over the Internet, enabling cloud applications to interact with other applications easily and efficiently.

You will find this term commonly used in Cloud Computing, Software Development

Cloud Architect

Plans and designs cloud environments with a focus on cloud services, infrastructure, and deployment strategies.

You will find this term commonly used in Cloud Computing

Cloud Assessment

The process of evaluating which business processes and applications can and should be moved to the cloud, considering factors such as cost, risk, and the potential for business transformation. This assessment helps organizations develop a strategic migration plan to the cloud.

You will find this term commonly used in Cloud Computing, Strategy

Cloud Auditing

The process of systematically reviewing and assessing the effectiveness and security of cloud services and infrastructure. Cloud auditing involves evaluating governance, compliance, operations, data security, and risk management practices within cloud environments to ensure they adhere to established policies and standards.

You will find this term commonly used in Cloud Computing, Security

Cloud Backup

The process of backing up data to a remote, cloud-based server. Cloud backup solutions enable businesses and individuals to store their data and files on the Internet using a storage service provider, rather than storing the data locally on a physical disk or server. This approach provides data protection and easy recovery in case of data loss.

You will find this term commonly used in Cloud Computing, Data Recovery

Cloud Bursting

A configuration set up between a private cloud and a public cloud to deal with peaks in IT demand. When the capacity of the private cloud is exceeded, additional resources are automatically activated in a public cloud to accommodate the excess demand, ensuring that services remain uninterrupted.

You will find this term commonly used in Cloud Computing, Networking

Cloud Computing

The delivery of computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the Internet ("the cloud") to offer faster innovation, flexible resources, and economies of scale. This paradigm enables businesses to avoid upfront infrastructure costs and focus on projects that differentiate their businesses instead of on infrastructure.

You will find this term commonly used in General IT, Networking

Cloud Computing Architecture

The components and subcomponents required for cloud computing. These components typically consist of a front-end platform (the client or device used to access the cloud), a back-end platform (servers and storage), a cloud-based delivery, and a network. Cloud computing architecture defines the interface, technology, and relationships between components. It's designed to leverage the power of cloud resources to solve business problems.

You will find this term commonly used in Cloud Computing

Cloud Computing Cost Management

The process of monitoring, analyzing, and optimizing the costs associated with cloud computing services. This includes identifying unnecessary expenditures, selecting appropriate service models, and implementing budget controls to ensure efficient use of cloud resources while avoiding overspending.

You will find this term commonly used in Cloud Computing, Financial Management

Cloud Computing Standards

A set of protocols, guidelines, and technologies that ensure interoperability, security, and portability between cloud computing platforms and services. These standards are developed by standardization bodies and industry consortia to facilitate the widespread adoption of cloud computing technologies.

You will find this term commonly used in Cloud Computing, IT Management

Cloud Data Encryption

The process of transforming readable data into an encoded format before it's stored in the cloud, making it inaccessible to unauthorized users. Data encryption is a critical component of cloud security, ensuring that sensitive information remains confidential and secure.

You will find this term commonly used in Cloud Computing, Security

Cloud Data Integration

The process of combining data from different cloud sources and environments into a coherent data store, database, or application. Cloud data integration solutions enable organizations to aggregate and manage data across multiple cloud services, facilitating analytics, reporting, and decision-making processes.

You will find this term commonly used in Cloud Computing, Data Management

Cloud Data Management Interface (CDMI)

An open standard that defines the interface that applications use to create, retrieve, update and delete data elements from the cloud. As cloud storage becomes more prevalent, having a standardized interface helps ensure interoperability between different cloud platforms and services.

You will find this term commonly used in Cloud Computing, Data Management

Cloud Data Privacy

The protection of personal and sensitive information stored in cloud services against unauthorized access, disclosure, or theft. Cloud data privacy involves implementing legal, technical, and administrative measures to ensure that data in the cloud is handled in accordance with privacy laws and standards.

You will find this term commonly used in Cloud Computing, Privacy

What's Your
Career Path?
ON SALE 60% OFF
Data Analyst Career Path

Data Analyst Career Path

Become a crucial member of your team as a Data Analyst
Total Hours
56 Training Hours
icons8-video-camera-58
358 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Google DevOps Engineer Career Path

Google DevOps Engineer Career Path

Expand your cloud knowledge or explore this career option as a Google DevOps Engineer.
Total Hours
41 Training Hours
icons8-video-camera-58
475 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Network Administrator Career Path

Network Administrator Career Path

Wanting to become a Network Administrator? This training series offers the core training you need.
Total Hours
158 Training Hours
icons8-video-camera-58
511 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Analyst Career Path

Information Security Analyst Career Path

Dive into Cybersecurity with our Comprehensive Information Security Analyst training series.
Total Hours
54 Training Hours
icons8-video-camera-58
215 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Network Security Analyst

Network Security Analyst Career Path

Become a proficient Network Security Analyst with our comprehensive training series, designed to equip you with the skills needed to protect networks and systems against cyber threats. Advance your career with key certifications and expert-led courses.
Total Hours
96 Training Hours
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Specialist

Entry Level Information Security Specialist Career Path

Jumpstart your cybersecurity career with our training series, designed for aspiring entry-level Information Security Specialists.
Total Hours
109 Training Hours
icons8-video-camera-58
502 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Career Path

Leadership Mastery: The Executive Information Security Manager

An advanced training series designed for those with prior experience in IT security disicplines wanting to advance into a management role.
Total Hours
95 Training Hours
icons8-video-camera-58
346 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Pentester Career Path

Pentester Career Path

Designed to equip aspiring professionals with the skills and knowledge essential for excelling in the field of penetration testing.
Total Hours
96 Training Hours
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
IT Project Manager

IT Project Manager Career Path

Explore the role of an IT Project Manager with our comprehensive IT Manager Career Path Series.
Total Hours
36 Training Hours
icons8-video-camera-58
151 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Video Editor Career Path

Video Editor Career Path

From mastering editing software to understanding the nuances of visual storytelling, this series is designed for aspiring video editors.
Total Hours
24 Training Hours
icons8-video-camera-58
154 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
AWS Cloud Practitioner

AWS Cloud Practitioner Career Path

Learn and get certified as an Amazon Web Services Cloud guru. From beginning ot avanced, this series is for you.
Total Hours
62 Training Hours
icons8-video-camera-58
473 On-demand Videos

$51.60

Add To Cart
ON SALE 61% OFF
ICD 9

ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

The Medical Billing Specialist training series is a comprehensive educational program designed to equip learners with the essential skills and knowledge required in the field of medical billing and coding.
Total Hours
37 Training Hours
icons8-video-camera-58
192 On-demand Videos

$39.00

Add To Cart