IT Glossary - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.
[th-aps]

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Network Flow

The sequence of packets from a source to a destination that is identified by a specific path or route.

You will find this term commonly used in Networking, Data Analysis

Network Forensics

Network forensics is the process of investigating and analyzing network traffic, logs, and activities to uncover evidence of security breaches, cyber attacks, or unauthorized activities within a computer network. It helps identify the source and impact of security incidents and support legal proceedings or incident response efforts.

You will find this term commonly used in Cybersecurity

Network Forensics Analysis Tool (NFAT)

Software tools used for capturing, recording, and analyzing network traffic to detect unauthorized access or malicious activity.

You will find this term commonly used in Networking, Security

Network Functions Virtualization

Network functions virtualization (NFV) is a network architecture approach that involves virtualizing networking services traditionally implemented in hardware, such as routers, firewalls, and load balancers, to improve scalability and flexibility.

You will find this term commonly used in Networking, Virtualization

Network Gateway

A network node equipped for interfacing with another network that uses different protocols.

You will find this term commonly used in Networking, Interoperability

Network Health Monitoring

The process of continuously monitoring a network for issues that could affect the performance and availability of network services.

You will find this term commonly used in Networking, IT Management

Network Hierarchy

The layered structure of a network, defining various levels of control, distribution, and access layers.

You will find this term commonly used in Networking, Network Design

Network Hub

A common connection point for devices in a network that uses broadcast to send data to all connected devices.

You will find this term commonly used in Networking, Hardware

Network Identification

The process or the means by which a network device or service is recognized and differentiated from others on a network.

You will find this term commonly used in Networking, Security

Network Infrastructure

The hardware and software components that enable communication, management, and connectivity in a computer network.

You will find this term commonly used in Networking

Network Interface

A network interface is a hardware or software component that enables a device to connect to a network. It provides the necessary physical or logical interface between the device and the network medium, allowing data transmission and reception.

You will find this term commonly used in Networking

Network Interface Card

A network interface card (NIC) is a hardware component that enables a computer to connect to a network, providing the necessary physical and data link layer interfaces for communication.

You will find this term commonly used in Networking, Hardware

Network Interface Card (NIC)

A hardware component that connects a computer or other device to a network, allowing it to send and receive data.

You will find this term commonly used in Networking

Network Jitter

The variation in the time of arrival of packets over a network, which can affect the quality of streaming media and real-time communications.

You will find this term commonly used in Networking, Performance Management

Network Kernel Extension (NKE)

A module that can be loaded into the kernel of an operating system to extend its networking capabilities.

You will find this term commonly used in Networking, Operating Systems

Network Layer

The network layer is the third layer of the OSI model and is responsible for routing packets across different networks to their destination. It determines the best path for data transmission and handles logical addressing and packet forwarding.

You will find this term commonly used in Networking

Network Licensing

A software licensing model that allows users to access software over a network, often based on the number of concurrent users.

You will find this term commonly used in Software Development, Licensing

Network Load Balancing

The process of distributing network traffic across multiple servers or network links to optimize resource utilization, reliability, and responsiveness.

You will find this term commonly used in Networking

Network Management

The administration and maintenance of computer networks to ensure their efficient operation, security, and reliability.

You will find this term commonly used in Networking

Network Management System (NMS)

A set of tools and applications designed for managing, monitoring, and maintaining computer networks.

You will find this term commonly used in Networking, IT Management

Network Mapping

The study of the physical connectivity of networks e.g., internet.

You will find this term commonly used in Networking, Security

Network Mapping Tool

Software used to visualize the layout and connections of a network, aiding in analysis and troubleshooting.

You will find this term commonly used in Networking, IT Management

Network Mashup

The combination of data or functionality from multiple sources over the network to create a new service or application.

You will find this term commonly used in Web Development, APIs

Network Modeling

The process of creating a mathematical model of a network to study its behavior under different scenarios.

You will find this term commonly used in Networking, Analysis

Network Modularization

The design principle of structuring a network into discrete modules to simplify management, enhance scalability, and improve resilience.

You will find this term commonly used in Networking, Design

Network Monitor

Software or hardware that observes and analyzes network traffic for performance evaluation, security monitoring, or troubleshooting.

You will find this term commonly used in Networking, Security

Network Monitoring

The process of observing and analyzing network traffic to ensure optimal performance, security, and availability.

You will find this term commonly used in Networking, Security

Network Operating System (NOS)

A network operating system (NOS) is software that provides the infrastructure and services necessary for computers to communicate and share resources in a network. Examples include Windows Server, Linux, and Novell NetWare.

You will find this term commonly used in Networking

Network Operations Center (NOC)

A centralized location where IT professionals directly support the efforts of remote monitoring and management software.

You will find this term commonly used in Networking, IT Management

Network Optimization

The process of adjusting the configuration and operation of a network to improve its efficiency, performance, and cost-effectiveness.

You will find this term commonly used in Networking, IT Management

Network Orchestration

The automated arrangement, coordination, and management of computer systems, applications, and services within a network.

You will find this term commonly used in Networking, Automation

Network Overlay

A virtual network that is built on top of existing network layers to support virtualized network functions or services.

You will find this term commonly used in Networking, Virtualization

Network Packet

A formatted unit of data carried by a packet-switched network.

You will find this term commonly used in Networking, Data Communication

Network Partitioning

Dividing a network into segments or subnets for improved performance, security, or management.

You will find this term commonly used in Networking, Design

Network Path

The series of connections through which data travels from source to destination across a network.

You will find this term commonly used in Networking, Data Communication

Network Penetration Testing

The process of evaluating the security of a computer network by simulating cyber attacks to identify vulnerabilities and weaknesses.

You will find this term commonly used in Security, Cybersecurity

Network Performance

Network performance refers to the speed, reliability, and efficiency of data transmission and communication within a computer network. It is influenced by factors such as bandwidth, latency, packet loss, and network congestion.

You will find this term commonly used in Networking

Network Performance Management

The practice of monitoring and managing network speed, availability, and reliability to ensure optimal performance.

You will find this term commonly used in Networking, IT Management

Network Performance Monitoring

Network performance monitoring is the continuous process of observing and analyzing network behavior and metrics to ensure optimal performance, identify bottlenecks, and troubleshoot issues.

You will find this term commonly used in Networking

Network Performance Optimization

Network performance optimization is the process of improving the speed, reliability, and efficiency of data transmission and communication within a computer network. It involves identifying and addressing bottlenecks, optimizing network configurations, and implementing technologies to enhance performance.

You will find this term commonly used in Networking

Network Perimeter

The boundary between an organization's secure internal network and the unsecured outside world.

You will find this term commonly used in Networking, Security

Network Planning

Network planning involves the design, configuration, and optimization of computer networks to meet the current and future requirements of an organization. It includes tasks such as capacity planning, topology design, and technology selection to ensure efficient and reliable network operation.

You will find this term commonly used in Networking

Network Policy

A set of rules and configurations designed to govern the behavior and security of a network and its resources.

You will find this term commonly used in Networking, Security

Network Policy Server (NPS)

A Microsoft server role that allows the creation and enforcement of network access policies for client health, connection request authentication, and connection request authorization.

You will find this term commonly used in Networking, Security

Network Port

A communication endpoint or interface where data is transferred in or out of a system or between systems.

You will find this term commonly used in Networking, Data Communication

Network Presence

The state or fact of existing, being present, or being available over a network, especially on the internet.

You will find this term commonly used in Networking, Web Presence

Network Processor

A high-performance microprocessor specifically designed for the processing needs of network data (packets).

You will find this term commonly used in Networking, Hardware

Network Programming

The development of software applications that function over a network to communicate with other applications or devices.

You will find this term commonly used in Software Development, Networking

Network Protocol

A set of rules and conventions governing how data is transmitted and received over a computer network.

You will find this term commonly used in Networking

Network Protocol Analyzer

A network protocol analyzer, also known as a packet sniffer or network analyzer, is a software tool used to capture, decode, and analyze network traffic in real-time. It helps troubleshoot network issues, identify security threats, and optimize network performance.

You will find this term commonly used in Networking, Security

What's Your
Career Path?
ICD 9
ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
37 Hrs 56 Min
icons8-video-camera-58
193 On-demand Videos

Original price was: $99.00.Current price is: $59.99.

Add To Cart
Web Designer Career Path
Web Designer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
34 Hrs 37 Min
icons8-video-camera-58
172 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Kubernetes Certification
Kubernetes Certification: The Ultimate Certification and Career Advancement Series

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
12 Hrs 18 Min
icons8-video-camera-58
207 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Information Security Analyst Career Path
Information Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
58 Hrs 1 Min
icons8-video-camera-58
225 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
CEH Career Path
Certified Ethical Hacker Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 51 Min
icons8-video-camera-58
807 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Project Manager
IT Project Manager Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
50 Hrs 41 Min
icons8-video-camera-58
273 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT User Support Specialist Career Path
Comprehensive IT User Support Specialist Training: Accelerate Your Career

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
128 Hrs 51 Min
icons8-video-camera-58
621 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Video Editor Career Path
Video Editor Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
24 Hrs 2 Min
icons8-video-camera-58
154 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Information Security Specialist
Entry Level Information Security Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
113 Hrs 4 Min
icons8-video-camera-58
513 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Manager's Survival Bundle
IT Manager’s Survival Bundle Training Series – 10 Courses

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
174 Hrs 15 Min
icons8-video-camera-58
773 On-demand Videos

Original price was: $179.00.Current price is: $47.40.

Add To Cart
AWS Cloud Practitioner
AWS Cloud Practitioner Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
62 Hrs 56 Min
icons8-video-camera-58
475 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Google DevOps Engineer Career Path
Google DevOps Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
43 Hrs 22 Min
icons8-video-camera-58
479 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart

Cyber Monday

70% off

Our Most popular LIFETIME All-Access Pass