IT Glossary - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Vulnerability Exploit

Code that attackers use to take advantage of a vulnerability in software.

You will find this term commonly used in Cybersecurity

Vulnerability Exploitation

The process of leveraging a security vulnerability to gain unauthorized access or perform malicious actions on a computer system or network.

You will find this term commonly used in Cybersecurity

Vulnerability Exposure

The act of making a software vulnerability known to the public, often with the intention of encouraging the vendor to fix the issue more quickly.

You will find this term commonly used in Cybersecurity

Vulnerability Intelligence

The knowledge obtained about vulnerabilities, including details about their existence, severity, and potential impact, which helps in making informed security decisions.

You will find this term commonly used in Cybersecurity

Vulnerability Management

The ongoing process of identifying, assessing, prioritizing, and mitigating security vulnerabilities in an organization's IT systems.

You will find this term commonly used in Cybersecurity

Vulnerability Mitigation

The process of reducing the severity or impact of a known vulnerability through various means, such as configuration changes, patches, or workarounds.

You will find this term commonly used in Cybersecurity

Vulnerability Patch

A piece of software designed to fix vulnerabilities in software or firmware.

You will find this term commonly used in Cybersecurity

Vulnerability Patch Management

The process of managing the acquisition, testing, and installation of patches to fix vulnerabilities in software and systems.

You will find this term commonly used in Cybersecurity

Vulnerability Patching

The process of applying updates to software or firmware to address security vulnerabilities.

You will find this term commonly used in Cybersecurity

Vulnerability Remediation

The process of fixing or mitigating known vulnerabilities in software or systems to protect against security breaches.

You will find this term commonly used in Cybersecurity

Vulnerability Reporting

The process by which information about security vulnerabilities is formally presented to manufacturers, developers, or the public.

You will find this term commonly used in Cybersecurity

Vulnerability Research

The study and analysis of vulnerabilities in software and systems to understand their causes, implications, and how they can be exploited or mitigated.

You will find this term commonly used in Cybersecurity

Vulnerability Risk Assessment

The process of identifying, quantifying, and prioritizing (or ranking) the vulnerabilities in a system.

You will find this term commonly used in Cybersecurity

Vulnerability Scanner

A software tool that scans computer systems or networks for known security vulnerabilities.

You will find this term commonly used in Cybersecurity

Vulnerability Scanning

The automated process of proactively identifying security vulnerabilities of computing systems in a network in order to determine if and where a system can be exploited and/or threatened.

You will find this term commonly used in Security, Cybersecurity

Vulnerability Scoring System

A system used to assign severity scores to vulnerabilities, helping organizations to prioritize their response based on the potential impact.

You will find this term commonly used in Cybersecurity

Vulnerability Testing

The practice of testing software and systems for vulnerabilities that could be exploited by attackers.

You will find this term commonly used in Cybersecurity

VXLAN (Virtual Extensible LAN)

A network virtualization technology that attempts to ameliorate the scalability problems associated with large cloud computing deployments.

You will find this term commonly used in Networking

VxLAN Tunneling

A network virtualization method that uses encapsulation techniques to extend Layer 2 networks over Layer 3 networks.

You will find this term commonly used in Networking

VxWorks

A real-time operating system (RTOS) that can be used in embedded systems.

You will find this term commonly used in Software Development, Embedded Systems

WAF (Web Application Firewall)

A security tool that monitors, filters, and blocks HTTP traffic to and from a web application, protecting it from various types of attacks.

You will find this term commonly used in Security, Web Development

WAN (Wide Area Network)

A network that spans a large geographical area, connecting multiple LANs.

You will find this term commonly used in Networking

WAN Acceleration

Technology that improves the efficiency of data transfer across wide area networks (WANs), often using techniques like compression and deduplication.

You will find this term commonly used in Networking

WAN Optimization

Techniques and technologies used to maximize the efficiency of data transfer across wide area networks.

You will find this term commonly used in Networking

WAP (Wireless Application Protocol)

A technical standard for accessing information over a mobile wireless network, commonly used in older mobile devices for web browsing.

You will find this term commonly used in Networking, Mobile Technology

Waterfall Model

A sequential software development process with distinct phases: requirements, design, implementation, testing, deployment, and maintenance.

You will find this term commonly used in Software Development

Watermarking

The process of embedding a visible or invisible marker into digital media to indicate ownership, authenticity, or usage rights.

You will find this term commonly used in Security, Digital Media

Waveform Audio File Format (WAV)

An audio file format standard for storing an audio bitstream on PCs. It is a mainstay for uncompressed audio data storage.

You will find this term commonly used in General IT

Wearable AI

Artificial intelligence technologies embedded in wearable devices, enhancing their functionality and interactivity.

You will find this term commonly used in AI/Wearable Technology

Wearable Cameras

Small, portable cameras worn on the body, often used for personal life logging or security purposes.

You will find this term commonly used in Wearable Technology

Wearable Computing

Computing devices that can be worn on the body, such as smartwatches, fitness trackers, and augmented reality glasses.

You will find this term commonly used in General IT, Mobile Technology

Wearable EEG Headsets

Devices that monitor brain activity through the scalp using electroencephalography (EEG) sensors, used for medical monitoring, brain-computer interfaces, and gaming.

You will find this term commonly used in Wearable Technology

Wearable Fitness Trackers

Devices worn on the body that track and record physical activity and health-related data, such as steps taken, calories burned, and heart rate.

You will find this term commonly used in Wearable Technology/Health IT

Wearable Medical Devices

Devices that are worn on the body and are designed to monitor health conditions, track medical metrics, or support medical treatments.

You will find this term commonly used in Health IT/Wearable Technology

Wearable Sensors

Sensors incorporated into wearable devices to monitor health and environmental data.

You will find this term commonly used in Wearable Technology

Wearable Smart Devices

Advanced wearable devices equipped with smart functionalities, including connectivity to the internet, apps, and advanced sensors for monitoring and interaction.

You will find this term commonly used in Wearable Technology

Wearable Technology

Wearable technology refers to electronic devices or gadgets worn as accessories or clothing items, typically equipped with sensors, connectivity features, and computing capabilities, enabling functions such as fitness tracking or health monitoring.

You will find this term commonly used in Consumer Electronics, HealthTech, Wearable Devices

Wearable VR Headsets

Virtual reality headsets that are wearable, providing immersive VR experiences for entertainment, education, and training.

You will find this term commonly used in Virtual Reality

Web 2.0

A term describing the second generation of the World Wide Web, focusing on user-generated content, collaboration, and web applications.

You will find this term commonly used in General IT, Web Development

Web 3.0

The next evolution of the World Wide Web, proposing decentralization, blockchain technologies, and a semantic web that improves data connectivity.

You will find this term commonly used in Web Development

Web Accessibility

The practice of ensuring that websites and web applications are usable by people with disabilities.

You will find this term commonly used in Web Development, Accessibility

Web Accessibility Guidelines

Standards and practices designed to make web content more accessible to people with disabilities.

You will find this term commonly used in Web Development

Web Accessibility Guidelines (WCAG)

A set of recommendations for making web content more accessible, primarily for people with disabilities.

You will find this term commonly used in Web Standards

Web Accessibility Initiative (WAI)

A set of guidelines developed by the World Wide Web Consortium (W3C) to ensure web content is accessible to people with disabilities.

You will find this term commonly used in Web Standards

Web Analytics

The measurement, collection, analysis, and reporting of web data for understanding and optimizing web usage.

You will find this term commonly used in Web Development, Data Analytics

Web API

A set of rules and protocols for building and interacting with web-based software applications.

You will find this term commonly used in Web Development, API Integration

Web Application

A web application is a software application that runs on web servers and is accessed through web browsers over the internet or intranet, providing interactive user interfaces and functionality for various purposes or tasks.

You will find this term commonly used in Web Development, Software Development

Web Application Architecture

The framework that defines the interactions between applications, databases, and middleware systems on the web.

You will find this term commonly used in Web Development

Web Application Firewall (WAF)

A security system that monitors and controls incoming and outgoing network traffic on web applications based on predetermined security rules.

You will find this term commonly used in Security

Web Application Security

Measures taken to secure web applications by identifying, fixing, and preventing security vulnerabilities.

You will find this term commonly used in Cybersecurity

What's Your
Career Path?
Web Designer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
34 Hrs 37 Min
icons8-video-camera-58
172 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
111 Hrs 24 Min
icons8-video-camera-58
518 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Project Manager Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AZ-104 Learning Path : Become an Azure Administrator

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
109 Hrs 6 Min
icons8-video-camera-58
433 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Data Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
56 Hrs 45 Min
icons8-video-camera-58
358 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
37 Hrs 56 Min
icons8-video-camera-58
193 On-demand Videos

Original price was: $99.00.Current price is: $29.00.

Add To Cart
Pentester Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
100 Hrs 16 Min
icons8-video-camera-58
430 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AWS Cloud Practitioner Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
62 Hrs 56 Min
icons8-video-camera-58
475 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Leadership Mastery: The Executive Information Security Manager

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
95 Hrs 34 Min
icons8-video-camera-58
348 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Administrator Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
162 Hrs 25 Min
icons8-video-camera-58
524 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Video Editor Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
24 Hrs 2 Min
icons8-video-camera-58
154 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Google DevOps Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
43 Hrs 22 Min
icons8-video-camera-58
479 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart

Cyber Monday

70% off

Our Most popular LIFETIME All-Access Pass