IT Glossary - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.
[th-aps]

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Network Protocol Stack

The collection of network protocols used together to handle communication over a network, organized in layers as per the OSI or TCP/IP model.

You will find this term commonly used in Networking, Protocols

Network Provisioning

The process of setting up the network infrastructure and services.

You will find this term commonly used in Networking, IT Management

Network QoS (Quality of Service)

The use of various technologies to manage network traffic, reduce latency, and enhance user experience.

You will find this term commonly used in Networking, IT Management

Network Quality of Service (QoS)

Policies and technologies to control traffic and ensure the performance of critical applications by managing bandwidth, delay, jitter, and packet loss.

You will find this term commonly used in Networking, Performance Management

Network Query

A request for information from the network, typically involving retrieval of data or status information about network resources or services.

You will find this term commonly used in Networking, Data Communication

Network Query Language (NQL)

A specialized query language for managing, updating, and retrieving data from a network-oriented database.

You will find this term commonly used in Networking, Data Management

Network Reconstruction

The process of rebuilding network infrastructure and services after a failure or disaster to restore normal operations.

You will find this term commonly used in Networking, Disaster Recovery

Network Redundancy

Network redundancy is the duplication of critical network components, connections, or pathways to ensure continuous operation and fault tolerance in case of component failures or network disruptions. It helps improve reliability and availability of network services.

You will find this term commonly used in Networking

Network Refactoring

The process of restructuring existing network architecture without changing its external behavior, to improve internal structure, efficiency, or manageability.

You will find this term commonly used in Networking, Design

Network Registration

The process by which devices or users are recognized and authorized to access network resources, often involving authentication and allocation of network addresses or resources.

You will find this term commonly used in Networking, Security

Network Reliability

The ability of a network to perform its required functions under stated conditions for a specified period of time without failure.

You will find this term commonly used in Networking, Reliability

Network Replication

The process of copying data or services from one network location to another to ensure data consistency and availability across multiple sites.

You will find this term commonly used in Networking, Data Management

Network Resilience

The ability of a network to maintain acceptable levels of service in the face of faults and challenges to normal operation.

You will find this term commonly used in Networking, Reliability

Network Resource Allocation

The process of distributing network resources (such as bandwidth, IP addresses) among users or applications according to a certain policy or requirement.

You will find this term commonly used in Networking, Performance Management

Network Response Time

The amount of time it takes for a network to respond to a request, including the time it takes for data to travel from the source to the destination and back.

You will find this term commonly used in Networking, Performance Management

Network Restoration

The process of returning a network or service to its original or operational state after a disruption or failure.

You will find this term commonly used in Networking, Disaster Recovery

Network Retransmission

The process of sending data again across a network, typically because the original transmission was lost, corrupted, or acknowledged as received incorrectly.

You will find this term commonly used in Networking, Data Communication

Network Routing

The process of selecting paths in a network along which to send network traffic, based on routing protocols and algorithms.

You will find this term commonly used in Networking, Data Communication

Network Routing Protocol

A protocol that specifies how routers communicate with each other, disseminating information that enables them to select routes between any two nodes on a computer network.

You will find this term commonly used in Networking, Protocols

Network Scalability

The ability of a network to handle a growing amount of work, or its potential to accommodate growth in demand for network resources.

You will find this term commonly used in Networking, Design

Network Scan

The process of identifying active devices on a network and their characteristics, such as open ports and running services, often used for security assessment or network management.

You will find this term commonly used in Networking, Security

Network Scheduler

A component that manages the distribution of network traffic across various resources according to a specific scheduling algorithm.

You will find this term commonly used in Networking, Performance Management

Network Schema

A logical blueprint or model that represents the organization, configuration, and relationships of network resources and services.

You will find this term commonly used in Networking, Design

Network Security

Measures taken to protect a computer network from unauthorized access, misuse, or modification.

You will find this term commonly used in Security, Cybersecurity

Network Security Architecture

Network security architecture refers to the design and implementation of security controls, mechanisms, and policies to protect computer networks from unauthorized access, data breaches, and cyber threats. It encompasses technologies such as firewalls, intrusion detection systems, and encryption protocols.

You will find this term commonly used in Networking, Security, Cybersecurity

Network Security Assessment

Network security assessment is the evaluation of an organization's network infrastructure, policies, and procedures to identify vulnerabilities, assess risks, and recommend security controls. It helps improve the overall security posture and compliance with regulations.

You will find this term commonly used in Security, Cybersecurity

Network Security Audit

A network security audit is a systematic evaluation of an organization's computer network infrastructure, policies, and practices to assess security vulnerabilities, compliance with regulatory standards, and adherence to best practices. It helps identify weaknesses and improve overall security posture.

You will find this term commonly used in Security, Cybersecurity

Network Security Controls

Network security controls are measures and mechanisms implemented within a computer network to protect against security threats, vulnerabilities, and attacks. They include technologies such as firewalls, intrusion detection systems, access control lists, and encryption protocols.

You will find this term commonly used in Security, Cybersecurity

Network Security Incident

A network security incident is any adverse event or occurrence within a computer network that poses a threat to the confidentiality, integrity, or availability of data or resources. Examples include unauthorized access, malware infections, and denial-of-service attacks.

You will find this term commonly used in Security, Cybersecurity

Network Security Key

A network security key, also known as a Wi-Fi password or passphrase, is a cryptographic key used to authenticate and secure access to a wireless network. It prevents unauthorized users from connecting to the network and protects data transmitted over the network.

You will find this term commonly used in Security, Networking

Network Security Policy

A network security policy is a set of rules, guidelines, and procedures established to govern the use, configuration, and management of security controls within a computer network. It defines the security posture and requirements of an organization's network.

You will find this term commonly used in Security, Cybersecurity

Network Security Threat

A network security threat is any potential danger or risk that could compromise the confidentiality, integrity, or availability of data or resources within a computer network. Common threats include malware, phishing attacks, DDoS attacks, and insider threats.

You will find this term commonly used in Security, Cybersecurity

Network Segmentation

The practice of dividing a computer network into smaller subnetworks to improve performance, security, and manageability.

You will find this term commonly used in Networking, Security

Network Segmentation Strategy

Network segmentation strategy is a plan or approach for dividing a computer network into smaller, isolated segments to improve security, performance, and manageability. It involves defining segmentation criteria, implementing controls, and monitoring traffic between segments.

You will find this term commonly used in Networking, Security

Network Segregation

The practice of separating network traffic into different segments based on criteria like function, security level, or user group, to enhance security and performance.

You will find this term commonly used in Networking, Security

Network Service Provider (NSP)

A company that provides backbone services to an Internet service provider (ISP), the company that most web users use for access to the Internet.

You will find this term commonly used in Networking, Internet Services

Network Session

A semi-permanent interactive information interchange between two or more devices, or between a computer and user (see session).

You will find this term commonly used in Networking, Data Communication

Network Simulation

The technique of using a computer model to predict the behavior of a network, typically for research, design, and planning purposes.

You will find this term commonly used in Networking, Analysis

Network Simulator

A network simulator is a software tool used to simulate the behavior and performance of computer networks. It allows network engineers and researchers to model and analyze network protocols, configurations, and scenarios in a controlled environment.

You will find this term commonly used in Networking

Network Slice

A concept in 5G networks where the network can create multiple virtual networks on top of a shared physical infrastructure.

You will find this term commonly used in Networking, Telecommunications

Network Slicing

A form of network virtualization that allows multiple virtual networks to be created on top of a common physical infrastructure, each with its own unique set of resources and policies.

You will find this term commonly used in Networking, 5G Technology

Network Sniffer

A software or hardware tool that captures and analyzes network packets.

You will find this term commonly used in Networking, Security

Network Sniffing

The act of using a software tool to capture and analyze packets traveling over a network, often used for troubleshooting, network analysis, and by malicious actors to intercept data.

You will find this term commonly used in Networking, Security

Network Socket

An endpoint in a communication flow across a computer network, consisting of an IP address and a port number, used by programs to send and receive data.

You will find this term commonly used in Networking, Programming

Network Softwarization

The process of implementing network functionality in software rather than hardware, enabling more flexible and dynamic network management and configuration.

You will find this term commonly used in Networking, Software-Defined Networking

Network Splicing

The process of combining multiple network connections to increase bandwidth or reliability.

You will find this term commonly used in Networking, IT Management

Network Spoofing

The act of masquerading as a legitimate device or user on a network by falsifying data to gain an illegitimate advantage.

You will find this term commonly used in Networking, Security

Network Stability

The ability of a network to remain consistent and functional in the face of changes and disturbances, ensuring continuous service and performance.

You will find this term commonly used in Networking, Reliability

Network Stack

A set of network protocol layers that work together to handle internet communications.

You will find this term commonly used in Networking, General IT

Network Standard

A set of guidelines and specifications for how devices communicate over a network, ensuring interoperability and compatibility among different manufacturers' products.

You will find this term commonly used in Networking, Standards

What's Your
Career Path?
Data Analyst Career Path
Data Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
56 Hrs 45 Min
icons8-video-camera-58
358 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Information Security Specialist
Entry Level Information Security Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
113 Hrs 4 Min
icons8-video-camera-58
513 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Information Security Career Path
Leadership Mastery: The Executive Information Security Manager

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
95 Hrs 34 Min
icons8-video-camera-58
348 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
CEH Career Path
Certified Ethical Hacker Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 51 Min
icons8-video-camera-58
807 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Cisco Network Career Path
Cisco Network Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 56 Min
icons8-video-camera-58
473 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AWS Cloud Practitioner
AWS Cloud Practitioner Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
62 Hrs 56 Min
icons8-video-camera-58
475 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Google DevOps Engineer Career Path
Google DevOps Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
43 Hrs 22 Min
icons8-video-camera-58
479 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Manager's Survival Bundle
IT Manager’s Survival Bundle Training Series – 10 Courses

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
174 Hrs 15 Min
icons8-video-camera-58
773 On-demand Videos

Original price was: $179.00.Current price is: $47.40.

Add To Cart
Information Security Analyst Career Path
Information Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
58 Hrs 1 Min
icons8-video-camera-58
225 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Pentester Career Path
Pentester Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
100 Hrs 16 Min
icons8-video-camera-58
430 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT User Support Specialist Career Path
Comprehensive IT User Support Specialist Training: Accelerate Your Career

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
128 Hrs 51 Min
icons8-video-camera-58
621 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Kubernetes Certification
Kubernetes Certification: The Ultimate Certification and Career Advancement Series

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
12 Hrs 18 Min
icons8-video-camera-58
207 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart

Cyber Monday

70% off

Our Most popular LIFETIME All-Access Pass