IT Glossary - N - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Network Security Key

A network security key, also known as a Wi-Fi password or passphrase, is a cryptographic key used to authenticate and secure access to a wireless network. It prevents unauthorized users from connecting to the network and protects data transmitted over the network.

You will find this term commonly used in Security, Networking

Network Security Policy

A network security policy is a set of rules, guidelines, and procedures established to govern the use, configuration, and management of security controls within a computer network. It defines the security posture and requirements of an organization's network.

You will find this term commonly used in Security, Cybersecurity

Network Security Threat

A network security threat is any potential danger or risk that could compromise the confidentiality, integrity, or availability of data or resources within a computer network. Common threats include malware, phishing attacks, DDoS attacks, and insider threats.

You will find this term commonly used in Security, Cybersecurity

Network Segmentation

The practice of dividing a computer network into smaller subnetworks to improve performance, security, and manageability.

You will find this term commonly used in Networking, Security

Network Segmentation Strategy

Network segmentation strategy is a plan or approach for dividing a computer network into smaller, isolated segments to improve security, performance, and manageability. It involves defining segmentation criteria, implementing controls, and monitoring traffic between segments.

You will find this term commonly used in Networking, Security

Network Segregation

The practice of separating network traffic into different segments based on criteria like function, security level, or user group, to enhance security and performance.

You will find this term commonly used in Networking, Security

Network Service Provider (NSP)

A company that provides backbone services to an Internet service provider (ISP), the company that most web users use for access to the Internet.

You will find this term commonly used in Networking, Internet Services

Network Session

A semi-permanent interactive information interchange between two or more devices, or between a computer and user (see session).

You will find this term commonly used in Networking, Data Communication

Network Simulation

The technique of using a computer model to predict the behavior of a network, typically for research, design, and planning purposes.

You will find this term commonly used in Networking, Analysis

Network Simulator

A network simulator is a software tool used to simulate the behavior and performance of computer networks. It allows network engineers and researchers to model and analyze network protocols, configurations, and scenarios in a controlled environment.

You will find this term commonly used in Networking

Network Slice

A concept in 5G networks where the network can create multiple virtual networks on top of a shared physical infrastructure.

You will find this term commonly used in Networking, Telecommunications

Network Slicing

A form of network virtualization that allows multiple virtual networks to be created on top of a common physical infrastructure, each with its own unique set of resources and policies.

You will find this term commonly used in Networking, 5G Technology

Network Sniffer

A software or hardware tool that captures and analyzes network packets.

You will find this term commonly used in Networking, Security

Network Sniffing

The act of using a software tool to capture and analyze packets traveling over a network, often used for troubleshooting, network analysis, and by malicious actors to intercept data.

You will find this term commonly used in Networking, Security

Network Socket

An endpoint in a communication flow across a computer network, consisting of an IP address and a port number, used by programs to send and receive data.

You will find this term commonly used in Networking, Programming

Network Softwarization

The process of implementing network functionality in software rather than hardware, enabling more flexible and dynamic network management and configuration.

You will find this term commonly used in Networking, Software-Defined Networking

Network Splicing

The process of combining multiple network connections to increase bandwidth or reliability.

You will find this term commonly used in Networking, IT Management

Network Spoofing

The act of masquerading as a legitimate device or user on a network by falsifying data to gain an illegitimate advantage.

You will find this term commonly used in Networking, Security

Network Stability

The ability of a network to remain consistent and functional in the face of changes and disturbances, ensuring continuous service and performance.

You will find this term commonly used in Networking, Reliability

Network Stack

A set of network protocol layers that work together to handle internet communications.

You will find this term commonly used in Networking, General IT

Network Standard

A set of guidelines and specifications for how devices communicate over a network, ensuring interoperability and compatibility among different manufacturers' products.

You will find this term commonly used in Networking, Standards

Network Stewardship

The practice of managing and maintaining network resources and infrastructure responsibly, with a focus on long-term sustainability and efficiency.

You will find this term commonly used in Networking, IT Management

Network Storage

The use of a network-connected device, such as a NAS or SAN, to store, manage, and access data across a network, providing centralized data access and management.

You will find this term commonly used in Networking, Data Storage

Network Storm

A condition in which network traffic floods the network, causing excessive broadcast traffic and degrading network performance, often due to a loop or malfunction in the network topology.

You will find this term commonly used in Networking, Performance Management

Network Strategy

The overall plan and approach for designing, implementing, and managing a network to meet the organization's objectives and requirements, including considerations for growth, security, and technology adoption.

You will find this term commonly used in Networking, Strategic Planning

Network Stress Testing

The process of evaluating a network's performance and reliability under extreme conditions or heavy load, to identify potential bottlenecks, weaknesses, and capacity limits.

You will find this term commonly used in Networking, Performance Management

Network Subnet

A logically visible subdivision of an IP network, created by partitioning a network's IP address space into multiple segments, improving routing efficiency and network organization.

You will find this term commonly used in Networking, Network Design

Network Subsystem

A specific, functional component within a network system, such as routing, switching, or security, that performs a distinct set of tasks related to network operation and management.

You will find this term commonly used in Networking, System Design

Network Surveillance

The monitoring of network traffic for the purpose of data collection, analysis, and potentially intercepting or logging data, often used for security monitoring or law enforcement.

You will find this term commonly used in Networking, Security

Network Synchronization

The process of coordinating the timing of events or operations across multiple devices or systems in a network, ensuring that actions occur in a timely and coordinated manner.

You will find this term commonly used in Networking, Network Management

Network TAP (Test Access Point)

A hardware device that allows monitoring of network traffic by creating a "copy" of the traffic for analysis without interfering with the network's operation.

You will find this term commonly used in Networking, Security

Network Telemetry

The collection and analysis of data about the network's performance and health.

You will find this term commonly used in Networking, IT Management

Network Threat Detection

Network threat detection is the process of monitoring network traffic and activity to identify and mitigate potential security threats, such as malware infections, unauthorized access attempts, or suspicious behavior. It relies on techniques such as anomaly detection, signature-based analysis, and machine learning to detect and respond to threats in real-time.

You will find this term commonly used in Security, Cybersecurity

Network Threat Intelligence

Network threat intelligence is information about potential or emerging security threats gathered from various sources, such as security research, threat feeds, and incident reports. It helps organizations identify and mitigate security risks more effectively.

You will find this term commonly used in Security, Cybersecurity

Network Throughput

The rate at which data is successfully transmitted over a network, usually measured in bits per second (bps).

You will find this term commonly used in Networking, Performance Management

Network Time Protocol (NTP)

A protocol used to synchronize the clocks of computers over a network.

You will find this term commonly used in Networking, General IT

Network Time Synchronization

The practice of aligning the clock times of computers within a network to a single reference time source, critical for coordinating events and operations.

You will find this term commonly used in Networking, IT Management

Network Topology

The physical or logical arrangement of nodes and connections in a computer network.

You will find this term commonly used in Networking

Network Topology Discovery

The process of automatically identifying the layout, devices, and connections in a network, often used for network management and security purposes.

You will find this term commonly used in Networking, IT Management

Network Traffic

Network traffic refers to the data packets transmitted between devices on a computer network. It includes all forms of communication, such as web browsing, email, file transfers, and streaming media, flowing between clients, servers, and network devices.

You will find this term commonly used in Networking

Network Traffic Analysis

The process of monitoring and analyzing data packets flowing through a computer network to detect and investigate security threats or performance issues.

You will find this term commonly used in Networking, Security

Network Traffic Engineering

The application of technology and scientific principles to the measurement, modeling, characterization, and control of network traffic to achieve desirable performance outcomes.

You will find this term commonly used in Networking, Performance Optimization

Network Traffic Management

The process of managing and optimizing the flow of network traffic to ensure efficient use of resources and adherence to quality of service (QoS) requirements.

You will find this term commonly used in Networking, IT Management

Network Traffic Shaping

The technique of regulating network data transfer to ensure a smooth flow of traffic and avoid bandwidth congestion, often by prioritizing certain types of traffic.

You will find this term commonly used in Networking, Performance Management

Network Transit

The service provided by network operators to carry traffic across their network, often involving multiple intermediate hops before reaching its destination.

You will find this term commonly used in Networking, Telecommunications

Network Transparency

The design principle in networking that hides the complexity and the details of network implementation from users and applications, making the network appear as a simple, direct connection.

You will find this term commonly used in Networking, Design Principles

Network Troubleshooting

Network troubleshooting is the process of diagnosing and resolving problems or issues that affect the performance, availability, or functionality of a computer network. It involves identifying the root cause of network problems and implementing solutions to restore normal operation.

You will find this term commonly used in Networking, Security

Network Tunneling

The process of encapsulating one type of network protocol within another protocol, enabling a secure or encrypted connection through an untrusted network.

You will find this term commonly used in Networking, Security

Network Utilization

A measure of the extent to which network resources (such as bandwidth) are being used, often expressed as a percentage of total capacity.

You will find this term commonly used in Networking, Performance Management

Network Validation

The process of testing and verifying the functionality and performance of a network or network components to ensure they meet specified requirements and standards.

You will find this term commonly used in Networking, Quality Assurance

What's Your
Career Path?
IT Manager’s Survival Bundle Training Series – 10 Courses

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
174 Hrs 15 Min
icons8-video-camera-58
773 On-demand Videos

Original price was: $179.00.Current price is: $47.40.

Add To Cart
Information Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
58 Hrs 1 Min
icons8-video-camera-58
225 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Data Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
56 Hrs 45 Min
icons8-video-camera-58
358 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AZ-104 Learning Path : Become an Azure Administrator

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
109 Hrs 6 Min
icons8-video-camera-58
433 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Certified Ethical Hacker Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 51 Min
icons8-video-camera-58
807 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Google DevOps Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
43 Hrs 22 Min
icons8-video-camera-58
479 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Comprehensive IT User Support Specialist Training: Accelerate Your Career

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
128 Hrs 51 Min
icons8-video-camera-58
621 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Administrator Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
162 Hrs 25 Min
icons8-video-camera-58
524 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Kubernetes Certification: The Ultimate Certification and Career Advancement Series

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
12 Hrs 18 Min
icons8-video-camera-58
207 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Entry Level Information Security Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
113 Hrs 4 Min
icons8-video-camera-58
513 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Cisco Network Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 56 Min
icons8-video-camera-58
473 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Project Manager Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart

Black Friday

70% off

Our Most popular LIFETIME All-Access Pass