A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
An API that allows applications on different computers to communicate within a local area network (LAN).
You will find this term commonly used in Networking, General IT
A bitmask used to determine what subnet an IP address belongs to.
You will find this term commonly used in Networking, Cybersecurity
The practice of implementing network changes that can improve the agility and security of the network infrastructure.
You will find this term commonly used in Networking, IT Management
A collection of interconnected computers and devices that can communicate and share resources with each other.
You will find this term commonly used in Networking
A security approach that regulates access to a network based on the user's identity, device type, and security posture.
You will find this term commonly used in Security, Cybersecurity
Network access control (NAC) is a security technology that enforces policies to control access to network resources based on the identity and compliance status of the devices seeking access. It helps prevent unauthorized access and mitigate security threats.
You will find this term commonly used in Security, Cybersecurity
A network access control list (ACL) is a set of rules or configurations applied to a network device, such as a router or firewall, to control the flow of traffic based on criteria such as IP addresses, ports, and protocols. It helps enforce security policies and restrict unauthorized access.
You will find this term commonly used in Networking, Security
A network access point (NAP) is a physical or virtual location where multiple network connections converge to exchange data traffic between different networks or network segments. It serves as a gateway or interconnection point for network traffic.
You will find this term commonly used in Networking
A server that provides access services to the users over a network, including access to the internet, remote dial-up, VPN services, etc.
You will find this term commonly used in Networking, Security
The process of enabling network service for a device or service, often involving configuration and provisioning.
You will find this term commonly used in Networking, IT Management
A hardware device that connects a computer to a network.
You will find this term commonly used in Networking, Hardware
A unique identifier assigned to a device on a computer network, typically in the form of an IP address or MAC address.
You will find this term commonly used in Networking
A method of remapping one IP address space into another by modifying network address information in packet headers.
You will find this term commonly used in Networking, Security
A professional responsible for managing and maintaining an organization's computer networks and systems.
You will find this term commonly used in Networking, Security
The process of capturing, aggregating, and analyzing data from the network to understand traffic patterns, performance issues, and security threats.
You will find this term commonly used in Networking, Analytics
A network analyzer is a hardware or software tool used to capture, analyze, and interpret network traffic and performance data. It helps diagnose network problems, optimize performance, and troubleshoot security issues by inspecting packet headers and payloads.
You will find this term commonly used in Networking, Security
The process of abstracting network and security resources from hardware to software to improve scalability, management, and security.
You will find this term commonly used in Networking, Security, Virtualization
A network appliance is a specialized hardware device or software application designed to perform specific network-related functions, such as routing, switching, firewalling, or network monitoring, without the need for extensive configuration or management.
You will find this term commonly used in Networking
Designs and reviews network requirements and capabilities for an organization, planning the network structure and technology implementations.
You will find this term commonly used in Networking, Infrastructure Design
The design and organization of a computer network, including its components, protocols, and communication pathways.
You will find this term commonly used in Networking
Network-attached storage (NAS) is a file-level storage device that provides data storage and access to multiple clients over a computer network, typically using protocols such as NFS or SMB.
You will find this term commonly used in Data Storage, Networking
A storage device that provides centralized data storage and access to multiple clients over a network.
You will find this term commonly used in Networking
The maximum data transfer rate of a network or internet connection, typically measured in bits per second (bps).
You will find this term commonly used in Networking
The use of networking technologies and analytical techniques to detect anomalies in the network behavior that may indicate a security threat.
You will find this term commonly used in Networking, Security
A device that connects multiple network segments at the data link layer (Layer 2) of the OSI model.
You will find this term commonly used in Networking, Hardware
The total volume of information that a network can handle at any given time, often measured in bandwidth (bits per second).
You will find this term commonly used in Networking, IT Management
A point in the network where the traffic is restricted or slowed down, which can be a potential security risk or bottleneck.
You will find this term commonly used in Networking, Security
A method in network information theory that allows for more efficient data transmission by combining multiple data streams into a single one.
You will find this term commonly used in Networking, Data Communication
Software or a tool that translates network configuration or policy from a high-level language into device-specific commands.
You will find this term commonly used in Networking, Software Development
A situation where a network node or link is carrying more data than it can handle, causing packet loss and delay.
You will find this term commonly used in Networking, IT Management
A specialized hardware or software used to manage network resources efficiently.
You will find this term commonly used in Networking, IT Management
The process of breaking down a complex network into simpler, more manageable parts for analysis or management.
You will find this term commonly used in Networking, IT Management
The process of rolling out new network infrastructure, services, or applications to a production environment.
You will find this term commonly used in Networking, IT Management
A network diagram is a visual representation of the components, connections, and interactions within a computer network. It helps network administrators and engineers visualize and understand the network topology, configuration, and dependencies.
You will find this term commonly used in Networking
A measure of the longest distance between two nodes in a network, which can indicate the network's size and complexity.
You will find this term commonly used in Networking, Network Design
The set of protocols and standards used for communication within a network.
You will find this term commonly used in Networking, Standards
The process of identifying and mapping devices, resources, and services on a computer network.
You will find this term commonly used in Networking, Security
The strategy of using multiple network paths and technologies to increase resilience and reduce the risk of network failure.
You will find this term commonly used in Networking, Security
The outermost layer of the network, closest to the end-users, where edge computing devices are located.
You will find this term commonly used in Networking, Edge Computing
The technique of imitating the behavior of a network under various conditions, used for testing and analysis.
You will find this term commonly used in Networking, Testing
The process of encoding data transmitted over a computer network to ensure its confidentiality and integrity.
You will find this term commonly used in Security, Cybersecurity
Any device or terminal that communicates over a network, such as computers, mobile devices, or IoT devices.
You will find this term commonly used in Networking, Security
A security appliance or software that ensures compliance with network policies and regulations by controlling access to the network.
You will find this term commonly used in Networking, Security
The discipline concerned with designing, implementing, and managing computer networks.
You will find this term commonly used in Networking, IT Management
The process of retrieving user names, machine names, network resources, and other services from a network.
You will find this term commonly used in Networking, Security
The interconnection of network elements and switches that are fully connected to each other.
You will find this term commonly used in Networking, Data Center
The process of creating a network topology, often in the context of virtualized or software-defined networking.
You will find this term commonly used in Networking, Network Design
A phenomenon in wireless communications where signal strength decreases due to environmental factors.
You will find this term commonly used in Networking, Wireless Communications
The process of linking together multiple networks or services to function as a single, unified system.
You will find this term commonly used in Networking, Cloud Computing
A security device or software that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
You will find this term commonly used in Security, Cybersecurity
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
$129.00 Original price was: $129.00.$51.60Current price is: $51.60.
ENDING THIS WEEKEND: Train for LIFE at our lowest price. Buy once and never have to pay for IT Training Again.