IT Glossary - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.
[th-aps]

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

NetBIOS (Network Basic Input/Output System)

An API that allows applications on different computers to communicate within a local area network (LAN).

You will find this term commonly used in Networking, General IT

Netmask

A bitmask used to determine what subnet an IP address belongs to.

You will find this term commonly used in Networking, Cybersecurity

NetOps (Network Operations)

The practice of implementing network changes that can improve the agility and security of the network infrastructure.

You will find this term commonly used in Networking, IT Management

Network

A collection of interconnected computers and devices that can communicate and share resources with each other.

You will find this term commonly used in Networking

Network Access Control

A security approach that regulates access to a network based on the user's identity, device type, and security posture.

You will find this term commonly used in Security, Cybersecurity

Network Access Control (NAC)

Network access control (NAC) is a security technology that enforces policies to control access to network resources based on the identity and compliance status of the devices seeking access. It helps prevent unauthorized access and mitigate security threats.

You will find this term commonly used in Security, Cybersecurity

Network Access Control List (ACL)

A network access control list (ACL) is a set of rules or configurations applied to a network device, such as a router or firewall, to control the flow of traffic based on criteria such as IP addresses, ports, and protocols. It helps enforce security policies and restrict unauthorized access.

You will find this term commonly used in Networking, Security

Network Access Point (NAP)

A network access point (NAP) is a physical or virtual location where multiple network connections converge to exchange data traffic between different networks or network segments. It serves as a gateway or interconnection point for network traffic.

You will find this term commonly used in Networking

Network Access Server (NAS)

A server that provides access services to the users over a network, including access to the internet, remote dial-up, VPN services, etc.

You will find this term commonly used in Networking, Security

Network Activation

The process of enabling network service for a device or service, often involving configuration and provisioning.

You will find this term commonly used in Networking, IT Management

Network Adapter

A hardware device that connects a computer to a network.

You will find this term commonly used in Networking, Hardware

Network Address

A unique identifier assigned to a device on a computer network, typically in the form of an IP address or MAC address.

You will find this term commonly used in Networking

Network Address Translation (NAT)

A method of remapping one IP address space into another by modifying network address information in packet headers.

You will find this term commonly used in Networking, Security

Network Administrator

A professional responsible for managing and maintaining an organization's computer networks and systems.

You will find this term commonly used in Networking, Security

Network Analytics

The process of capturing, aggregating, and analyzing data from the network to understand traffic patterns, performance issues, and security threats.

You will find this term commonly used in Networking, Analytics

Network Analyzer

A network analyzer is a hardware or software tool used to capture, analyze, and interpret network traffic and performance data. It helps diagnose network problems, optimize performance, and troubleshoot security issues by inspecting packet headers and payloads.

You will find this term commonly used in Networking, Security

Network and Security Virtualization

The process of abstracting network and security resources from hardware to software to improve scalability, management, and security.

You will find this term commonly used in Networking, Security, Virtualization

Network Appliance

A network appliance is a specialized hardware device or software application designed to perform specific network-related functions, such as routing, switching, firewalling, or network monitoring, without the need for extensive configuration or management.

You will find this term commonly used in Networking

Network Architect

Designs and reviews network requirements and capabilities for an organization, planning the network structure and technology implementations.

You will find this term commonly used in Networking, Infrastructure Design

Network Architecture

The design and organization of a computer network, including its components, protocols, and communication pathways.

You will find this term commonly used in Networking

Network Attached Storage

Network-attached storage (NAS) is a file-level storage device that provides data storage and access to multiple clients over a computer network, typically using protocols such as NFS or SMB.

You will find this term commonly used in Data Storage, Networking

Network Attached Storage (NAS)

A storage device that provides centralized data storage and access to multiple clients over a network.

You will find this term commonly used in Networking

Network Bandwidth

The maximum data transfer rate of a network or internet connection, typically measured in bits per second (bps).

You will find this term commonly used in Networking

Network Behavior Analysis (NBA)

The use of networking technologies and analytical techniques to detect anomalies in the network behavior that may indicate a security threat.

You will find this term commonly used in Networking, Security

Network Bridge

A device that connects multiple network segments at the data link layer (Layer 2) of the OSI model.

You will find this term commonly used in Networking, Hardware

Network Capacity

The total volume of information that a network can handle at any given time, often measured in bandwidth (bits per second).

You will find this term commonly used in Networking, IT Management

Network Choke Point

A point in the network where the traffic is restricted or slowed down, which can be a potential security risk or bottleneck.

You will find this term commonly used in Networking, Security

Network Coding

A method in network information theory that allows for more efficient data transmission by combining multiple data streams into a single one.

You will find this term commonly used in Networking, Data Communication

Network Compiler

Software or a tool that translates network configuration or policy from a high-level language into device-specific commands.

You will find this term commonly used in Networking, Software Development

Network Congestion

A situation where a network node or link is carrying more data than it can handle, causing packet loss and delay.

You will find this term commonly used in Networking, IT Management

Network Controller

A specialized hardware or software used to manage network resources efficiently.

You will find this term commonly used in Networking, IT Management

Network Decomposition

The process of breaking down a complex network into simpler, more manageable parts for analysis or management.

You will find this term commonly used in Networking, IT Management

Network Deployment

The process of rolling out new network infrastructure, services, or applications to a production environment.

You will find this term commonly used in Networking, IT Management

Network Diagram

A network diagram is a visual representation of the components, connections, and interactions within a computer network. It helps network administrators and engineers visualize and understand the network topology, configuration, and dependencies.

You will find this term commonly used in Networking

Network Diameter

A measure of the longest distance between two nodes in a network, which can indicate the network's size and complexity.

You will find this term commonly used in Networking, Network Design

Network Diction

The set of protocols and standards used for communication within a network.

You will find this term commonly used in Networking, Standards

Network Discovery

The process of identifying and mapping devices, resources, and services on a computer network.

You will find this term commonly used in Networking, Security

Network Diversification

The strategy of using multiple network paths and technologies to increase resilience and reduce the risk of network failure.

You will find this term commonly used in Networking, Security

Network Edge

The outermost layer of the network, closest to the end-users, where edge computing devices are located.

You will find this term commonly used in Networking, Edge Computing

Network Emulation

The technique of imitating the behavior of a network under various conditions, used for testing and analysis.

You will find this term commonly used in Networking, Testing

Network Encryption

The process of encoding data transmitted over a computer network to ensure its confidentiality and integrity.

You will find this term commonly used in Security, Cybersecurity

Network Endpoint

Any device or terminal that communicates over a network, such as computers, mobile devices, or IoT devices.

You will find this term commonly used in Networking, Security

Network Enforcer

A security appliance or software that ensures compliance with network policies and regulations by controlling access to the network.

You will find this term commonly used in Networking, Security

Network Engineering

The discipline concerned with designing, implementing, and managing computer networks.

You will find this term commonly used in Networking, IT Management

Network Enumeration

The process of retrieving user names, machine names, network resources, and other services from a network.

You will find this term commonly used in Networking, Security

Network Fabric

The interconnection of network elements and switches that are fully connected to each other.

You will find this term commonly used in Networking, Data Center

Network Fabrication

The process of creating a network topology, often in the context of virtualized or software-defined networking.

You will find this term commonly used in Networking, Network Design

Network Fading

A phenomenon in wireless communications where signal strength decreases due to environmental factors.

You will find this term commonly used in Networking, Wireless Communications

Network Federation

The process of linking together multiple networks or services to function as a single, unified system.

You will find this term commonly used in Networking, Cloud Computing

Network Firewall

A security device or software that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

You will find this term commonly used in Security, Cybersecurity

What's Your
Career Path?
Information Security Specialist
Entry Level Information Security Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
113 Hrs 4 Min
icons8-video-camera-58
513 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Data Analyst Career Path
Data Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
56 Hrs 45 Min
icons8-video-camera-58
358 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
CEH Career Path
Certified Ethical Hacker Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 51 Min
icons8-video-camera-58
807 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT User Support Specialist Career Path
Comprehensive IT User Support Specialist Training: Accelerate Your Career

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
128 Hrs 51 Min
icons8-video-camera-58
621 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Security Analyst
Network Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
111 Hrs 24 Min
icons8-video-camera-58
518 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Pentester Career Path
Pentester Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
100 Hrs 16 Min
icons8-video-camera-58
430 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Information Security Career Path
Leadership Mastery: The Executive Information Security Manager

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
95 Hrs 34 Min
icons8-video-camera-58
348 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Manager's Survival Bundle
IT Manager’s Survival Bundle Training Series – 10 Courses

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
174 Hrs 15 Min
icons8-video-camera-58
773 On-demand Videos

Original price was: $179.00.Current price is: $47.40.

Add To Cart
Network Administrator Career Path
Network Administrator Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
162 Hrs 25 Min
icons8-video-camera-58
524 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Cisco Network Career Path
Cisco Network Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 56 Min
icons8-video-camera-58
473 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Information Security Analyst Career Path
Information Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
58 Hrs 1 Min
icons8-video-camera-58
225 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Google DevOps Engineer Career Path
Google DevOps Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
43 Hrs 22 Min
icons8-video-camera-58
479 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart

Cyber Monday

70% off

Our Most popular LIFETIME All-Access Pass