IT Glossary
Key Terms To Know In The IT Industry
SaaS (Software as a Service)
A software delivery model where software is hosted by a third-party provider and made available to customers over the internet, usually on a subscription basis.
You will find this term commonly used in Cloud Computing, General IT
SAFe (Scaled Agile Framework)
A set of organization and workflow patterns intended to guide enterprises in scaling lean and agile practices beyond single teams.
You will find this term commonly used in Software Development, Agile Methodologies
Salesforce
A cloud-based software company that provides customer relationship management service and also sells a complementary suite of enterprise applications.
You will find this term commonly used in CRM, Cloud Computing
Salesforce Certified Administrator
Demonstrates the ability to configure and manage a Salesforce application.
You will find this term commonly used in CRM Administration
Salesforce Certified Advanced Administrator
Demonstrates advanced knowledge of Salesforce administration, focusing on higher-level features, customization, and management.
You will find this term commonly used in CRM, Administration
Salesforce Certified Developer
Validates skills in custom development for Salesforce applications, including the ability to develop business logic and interfaces using the Salesforce platform.
You will find this term commonly used in CRM, Software Development
SAM (Software Asset Management)
The process of managing and optimizing the purchase, deployment, maintenance, utilization, and disposal of software applications within an organization.
You will find this term commonly used in General IT, Software Management
SAML (Security Assertion Markup Language)
A standard for exchanging authentication and authorization data between parties, particularly between an identity provider and a service provider.
You will find this term commonly used in Security, Cybersecurity
SAN
Storage Area Network, a specialized network that provides access to storage resources.
You will find this term commonly used in Storage
SAN (Storage Area Network)
A dedicated high-speed network that provides access to shared storage resources, such as disk arrays or tape libraries.
You will find this term commonly used in Storage
Sandbox
An isolated environment where untrusted programs can be executed without affecting the host system, commonly used for testing and security purposes.
You will find this term commonly used in Security, Cybersecurity
SANS Institute
Offers training and certifications in cybersecurity and information security, known for in-depth technical courses and GIAC certifications.
You will find this term commonly used in Cybersecurity
SATA (Serial ATA)
An interface used to connect ATA hard drives to a computer's motherboard, supporting faster data transfer speeds than its predecessor, PATA.
You will find this term commonly used in General IT, Hardware
SCADA (Supervisory Control and Data Acquisition)
A control system architecture that uses computers, networked data communications, and graphical user interfaces for high-level process supervisory management.
You will find this term commonly used in Networking, Security
Scalability
The ability of a system, network, or process to handle growing amounts of work or users without sacrificing performance or reliability.
You will find this term commonly used in General IT
Scalability Testing
A type of testing to ensure a software application can handle the expected number of users, the amount of data, the number of transactions, etc.
You will find this term commonly used in Software Development, Testing
Scalable
A system or application's ability to handle increasing amounts of work or users without significant performance degradation.
You will find this term commonly used in General IT, Networking
Schema
In databases, a schema represents the organizational structure of the database comprising tables, views, and the relationships between them.
You will find this term commonly used in Databases, Data Management
Schema Migration
The process of managing changes to a database schema over time, including updates, deletions, and additions to the schema structure.
You will find this term commonly used in Databases, Software Development
Script Kiddie
A derogatory term for an inexperienced cybercriminal who uses scripts or programs developed by others to attack computer systems and networks.
You will find this term commonly used in Cybersecurity
Scripting
Writing code to automate tasks or processes.
You will find this term commonly used in General IT
Scrum
An Agile framework used for managing software development projects, emphasizing iterative development and collaboration.
You will find this term commonly used in Project Management, General IT
Scrum Master
A role within a Scrum team responsible for ensuring the team follows agile practices and principles.
You will find this term commonly used in Software Development, Agile Methodologies
SD-WAN (Software-Defined Wide Area Network)
A specific application of software-defined networking (SDN) technology applied to WAN connections, which are used to connect enterprise networks over large geographic distances.
You will find this term commonly used in Networking, Software Defined Networking
SDDC (Software-Defined Data Center)
A data center where all infrastructure is virtualized and delivered as a service, and the control of the data center is automated by software.
You will find this term commonly used in Networking, Cloud Computing
SDK (Software Development Kit)
A collection of software development tools in one installable package, designed to facilitate the creation of applications.
You will find this term commonly used in Software Development
SDLC (Software Development Life Cycle)
The process of planning, designing, developing, testing, deploying, and maintaining software applications.
You will find this term commonly used in Programming, General IT
SDP (Software-Defined Perimeter)
A security framework that denies access to resources until the identity of the device and the user has been verified.
You will find this term commonly used in Security, Cybersecurity
Search Algorithm
An algorithm for finding an item with specified properties among a collection of items. It can be either a general algorithm or a domain specific search algorithm.
You will find this term commonly used in Software Development, Algorithms
Search Engine
A program or website that enables users to search for information on the internet by entering keywords or phrases.
You will find this term commonly used in General IT
Search Engine Optimization (SEO)
The process of improving the quality and quantity of website traffic by increasing the visibility of a website or a web page to users of a web search engine.
You will find this term commonly used in General IT, Marketing
Secure Access Service Edge (SASE)
A network architecture that combines VPN and SD-WAN capabilities with cloud-native security functions.
You will find this term commonly used in Networking, Security
Secure Boot
A security feature that ensures only trusted software is executed during the boot process of a computer system.
You will find this term commonly used in Security, General IT
Secure Coding
Practices that aim to write software in such a way that prevents the introduction of security vulnerabilities.
You will find this term commonly used in Software Development, Security
Secure Shell (SSH)
A cryptographic network protocol for secure communication over an unsecured network.
You will find this term commonly used in Security
Secure Socket Layer (SSL)
Secure Socket Layer (SSL) is a cryptographic protocol that ensures secure communication over a computer network by encrypting data transmitted between clients and servers, preventing unauthorized access and data tampering.
You will find this term commonly used in Security, Networking, Cryptography
Security
The protection of computer systems, networks, and data from unauthorized access, attacks, damage, or theft.
You will find this term commonly used in Security, Cybersecurity
Security Assertion Markup Language (SAML)
An open standard that allows identity providers to pass authorization credentials to service providers.
You will find this term commonly used in Security, Web Development
Security Breach
Unauthorized access to, or disclosure of, sensitive information, usually as a result of a cyber attack or data breach.
You will find this term commonly used in Cybersecurity, Security
Security Engineer
Designs and implements systems and measures to protect an organization's data and infrastructure from cyber threats.
You will find this term commonly used in Cybersecurity, IT Security
Security Operations Center (SOC)
A centralized unit that deals with security issues on an organizational and technical level.
You will find this term commonly used in Security, Cybersecurity
Security Token
A physical or digital device that provides two factor authentication for a user to prove their identity in a login process.
You will find this term commonly used in Cybersecurity
Self-Driving Cars
Autonomous vehicles equipped with sensors and software to navigate and operate without human input.
You will find this term commonly used in AI, Robotics, General IT
Self-Healing
The ability of a system or network to automatically detect and recover from failures or errors.
You will find this term commonly used in General IT, Networking
Semantic Analysis
The process of understanding the meaning and interpretation of words, phrases, and sentences in the context of a language.
You will find this term commonly used in AI, Natural Language Processing
Semantic Web
An extension of the World Wide Web through standards by the World Wide Web Consortium (W3C). It promotes common data formats and exchange protocols on the Web.
You will find this term commonly used in General IT, Web Development
Semiconductor
A material that has a conductivity between conductors (usually metals) and nonconductors or insulators (such as most ceramics). Semiconductors are used in the manufacture of various kinds of electronic devices.
You will find this term commonly used in Hardware, Electronics
Sensor
A device that detects or measures physical properties and converts them into signals that can be interpreted and used by computers.
You will find this term commonly used in General IT
SEO (Search Engine Optimization)
The process of improving the quality and quantity of website traffic by increasing the visibility of a website or a web page to users of a web search engine.
You will find this term commonly used in General IT, Marketing
Serialization
The process of converting an object into a stream of bytes to store the object or transmit it to memory, a database, or a file.
You will find this term commonly used in Software Development, Programming
Career Path?
Pentester Career Path
$129.00 $51.60
Comprehensive IT User Support Specialist Training: Accelerate Your Career
$51.60 – $169.00
Entry Level Information Security Specialist Career Path
$129.00 $51.60
Network Security Analyst Career Path
$129.00 $51.60
Network Administrator Career Path
$129.00 $51.60
Kubernetes Certification: The Ultimate Certification and Career Advancement Series
$129.00 $51.60
Cisco Network Engineer Career Path
$129.00 $51.60
Information Security Analyst Career Path
$129.00 $51.60
ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path
$99.00 $39.00
Google DevOps Engineer Career Path
$129.00 $51.60
AZ-104 Learning Path : Become an Azure Administrator
$51.60 – $169.00
Data Analyst Career Path
$129.00 $51.60