IT Glossary - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Cloud Optimization

The process of adjusting cloud computing resources and services to achieve the most efficient system configuration, balancing performance and cost. Optimization strategies can involve selecting the right types of services, scaling resources to meet demand, and identifying underutilized resources for downsizing.

You will find this term commonly used in Cloud Computing, IT Management

Cloud Optimization Techniques

Methods and strategies used to enhance the efficiency and cost-effectiveness of cloud computing resources. Techniques include rightsizing services, selecting appropriate pricing models, automating resource scaling, and employing modern cloud-native architectures to reduce waste and optimize performance.

You will find this term commonly used in Cloud Computing, Optimization

Cloud Orchestration Platform

A suite of automation tools and technologies used to manage and coordinate the complex tasks of configuring, provisioning, and managing cloud computing resources and services. Orchestration platforms enable businesses to automate workflows across multiple cloud environments, improving efficiency and reducing manual intervention.

You will find this term commonly used in Cloud Computing, DevOps

Cloud Performance Monitoring

The continuous observation and analysis of cloud-based services and infrastructure to ensure they are operating at optimal performance levels. Performance monitoring tools and practices help identify potential issues, assess system health, and ensure that cloud deployments meet both user expectations and service level agreements (SLAs).

You will find this term commonly used in Cloud Computing, Performance Management

Cloud Provisioning

The process of allocating cloud resources and services to users. It involves the automated deployment of servers, software, and storage from a cloud provider. Cloud provisioning enables the scalable and flexible allocation of computing resources, often in real time, based on demand.

You will find this term commonly used in Cloud Computing

Cloud Reference Architecture

A framework that outlines the components and capabilities of cloud computing architectures, including how they interact and are managed. It serves as a guide for designing, implementing, and managing cloud environments according to best practices and standards.

You will find this term commonly used in Cloud Computing, Architecture

Cloud Resource Consolidation

The strategy of combining multiple cloud services or resources into a single, more efficient infrastructure to reduce costs, simplify management, and improve performance. This approach can involve merging data centers, virtualizing servers, or utilizing shared cloud services to optimize resource use.

You will find this term commonly used in Cloud Computing, IT Management

Cloud Resource Optimization

The process of adjusting cloud resources and services to match demand efficiently, ensuring optimal performance and cost-effectiveness. Resource optimization involves scaling resources up or down based on usage, selecting the right types of services, and eliminating waste.

You will find this term commonly used in Cloud Computing, IT Management

Cloud Scalability

The ability of a cloud computing environment to easily scale up or down resources and services according to the demand. Scalability is a fundamental feature of cloud computing, allowing for the efficient handling of varying workloads without compromising performance or security.

You will find this term commonly used in Cloud Computing, IT Management

Cloud Security

A broad set of policies, technologies, applications, and controls utilized to protect virtualized IP, data, applications, services, and the associated infrastructure of cloud computing. It is a significant segment of network security that includes keeping data private and secure across online-based infrastructure, applications, and platforms.

You will find this term commonly used in Security, Cloud Computing

Cloud Security Architecture

The design and implementation of security controls and policies within a cloud computing environment to protect data, applications, and infrastructure from threats. A robust cloud security architecture considers various aspects, including data encryption, access control, threat detection, and compliance with industry standards.

You will find this term commonly used in Cloud Computing, Security

Cloud Security Posture Management (CSPM)

A security process that involves continuously monitoring and improving the security posture of cloud environments. CSPM solutions help identify and remediate risks associated with cloud resource configurations, compliance with security policies, and alignment with best practices.

You will find this term commonly used in Cloud Computing, Security

Cloud Service Agreement (CSA)

A formal contract between a cloud service provider and a customer that specifies the levels of service, performance standards, terms, and conditions of the cloud service. CSAs often include details on data protection, privacy, and compliance obligations.

You will find this term commonly used in Cloud Computing, Legal

Cloud Service Automation

The use of technology to automate the deployment, scaling, and management of cloud services. Cloud service automation tools help streamline cloud operations, reduce manual tasks, and improve the efficiency and reliability of cloud environments.

You will find this term commonly used in Cloud Computing, IT Management

Cloud Service Brokerage

The intermediary role or service that manages the use, performance, and delivery of cloud services, and negotiates relationships between cloud providers and cloud consumers. Cloud service brokerage aims to simplify cloud service consumption, integrate disparate services, and ensure that the needs of the consumers are met with the appropriate cloud solutions.

You will find this term commonly used in Cloud Computing, IT Management

Cloud Service Catalog

A comprehensive list of cloud services and resources offered by a cloud provider to its customers. The catalog typically includes detailed information on each service, including features, pricing, and deployment options, helping users to understand and select the appropriate services for their needs.

You will find this term commonly used in Cloud Computing, IT Management

Cloud Service Dependency Mapping

The process of identifying and documenting the relationships and dependencies between various cloud services and resources within an organization's cloud environment. Dependency mapping helps in understanding the interconnectedness of services, which is crucial for disaster recovery planning, risk management, and ensuring service continuity.

You will find this term commonly used in Cloud Computing, IT Management

Cloud Service Discovery

The process of automatically detecting and identifying cloud services in use within an organization. This can help IT departments manage and secure their cloud assets more effectively by providing visibility into unauthorized or shadow IT services.

You will find this term commonly used in Cloud Computing, IT Management

Cloud Service Level Agreement (SLA)

A formal agreement between a cloud service provider and a customer that outlines the performance and quality metrics that the provider must meet. SLAs are critical for ensuring that cloud services are reliable, performant, and accountable.

You will find this term commonly used in Cloud Computing, Business

Cloud Service Management

The operational processes and practices involved in managing cloud services to ensure they meet business and technical requirements. This includes tasks such as service provisioning, performance monitoring, security management, and compliance auditing.

You will find this term commonly used in Cloud Computing, IT Management

Cloud Service Model

The specific offering type provided by cloud computing services, including Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Each model offers different levels of control, flexibility, and management, allowing businesses to select the most appropriate services for their needs.

You will find this term commonly used in Cloud Computing

Cloud Service Orchestration

The process of integrating and managing multiple cloud services and resources to automate workflows or processes. Orchestration simplifies the management of complex tasks and services, ensuring they work harmoniously in a cloud environment.

You will find this term commonly used in Cloud Computing, IT Management

Cloud Service Provider (CSP)

An organization that offers network services, infrastructure, or business applications in the cloud. The services are hosted in a data center that can be accessed by companies or individuals using network connectivity.

You will find this term commonly used in Cloud Computing, Networking

Cloud Services Developer

Develops services and applications that are cloud-native, focusing on scalability, flexibility, and remote accessibility.

You will find this term commonly used in Cloud Computing, Software Development

Cloud Storage

A model of computer data storage in which the digital data is stored in logical pools, said to be on "the cloud". The physical storage spans multiple servers (sometimes in multiple locations), and the physical environment is typically owned and managed by a hosting company. These cloud storage providers are responsible for keeping the data available and accessible while the physical environment protected.

You will find this term commonly used in Networking, General IT

Cloud Storage Encryption

The process of converting data stored in cloud services into a coded form that can only be accessed and decrypted by authorized users. Encryption protects data privacy and security by ensuring that sensitive information is unreadable to unauthorized individuals or in the event of a data breach.

You will find this term commonly used in Cloud Computing, Data Security

Cloud Storage Gateway

A network appliance or server which translates cloud storage APIs such as SOAP or REST to block-based storage protocols like iSCSI, Fiber Channel, or file-based interfaces such as NFS or SMB. These gateways enable businesses to integrate cloud storage into applications and data centers with existing storage infrastructure, facilitating hybrid cloud storage models.

You will find this term commonly used in Cloud Computing

Cloud Storage Optimization

The process of enhancing the efficiency and cost-effectiveness of cloud storage solutions. Optimization techniques may include data deduplication, compression, tiering, and lifecycle management to reduce storage needs and costs while ensuring data availability and compliance.

You will find this term commonly used in Cloud Computing, Data Management

Cloud Workload Protection

The security measures and technologies implemented to protect applications and data that are run within cloud environments from threats and vulnerabilities. Protection strategies include application security, network security, data encryption, and identity and access management, tailored to the dynamic and scalable nature of cloud workloads.

You will find this term commonly used in Cloud Computing, Security

Cloud Workload Protection Platform (CWPP)

A security solution designed specifically for protecting cloud workloads across various environments, including public, private, and hybrid clouds. CWPPs provide visibility, compliance monitoring, threat detection, and vulnerability management to ensure the security of applications and data across cloud-native architectures.

You will find this term commonly used in Cloud Computing, Security

Cloud-Based Development

The use of cloud environments to develop, deploy, and manage applications. This approach leverages cloud resources for software development, allowing for scalability, collaboration, and access to a wide range of development tools and services.

You will find this term commonly used in Cloud Computing, Software Development

Cloud-Based Development Environment

A software development environment hosted on a cloud platform, providing developers with a suite of development tools and resources accessible over the internet. Cloud-based environments facilitate collaboration, scalability, and access from anywhere, enhancing productivity and reducing the need for local hardware resources.

You will find this term commonly used in Cloud Computing, Software Development

Cloud-Based Disaster Recovery (CBDR)

A strategy that utilizes cloud computing resources to protect applications and data from the impact of disasters. CBDR enables organizations to quickly recover IT operations by leveraging the cloud's scalability and flexibility, reducing downtime and data loss in the event of system failures, natural disasters, or cyberattacks.

You will find this term commonly used in Cloud Computing, Disaster Recovery

Cloud-Based Integration Platform

A platform that facilitates the integration of cloud-based and on-premises applications, systems, and services. This enables organizations to create cohesive and efficient IT environments by allowing different applications to communicate and share data seamlessly, regardless of where they are hosted.

You will find this term commonly used in Cloud Computing, Software Development

Cloud-Based Security Services

Security services that are delivered over the cloud, providing scalable and flexible security solutions to protect against cyber threats. These services can include identity and access management, threat detection, encryption, and more.

You will find this term commonly used in Cloud Computing, Security

Cloud-Based Software Testing

The practice of using cloud resources to conduct software testing, offering scalability, flexibility, and cost savings. Cloud-based testing allows for the simulation of diverse computing environments and user scenarios, facilitating comprehensive testing coverage and the efficient identification of bugs and performance issues.

You will find this term commonly used in Software Development, Cloud Computing

Cloud-Based Virtual Desktop Infrastructure (VDI)

A virtualization technology that hosts desktop environments on a centralized server in the cloud, allowing users to access their desktops over the Internet from any device. Cloud-based VDI provides flexibility, scalability, and centralized management, offering an efficient solution for remote work and BYOD (Bring Your Own Device) policies.

You will find this term commonly used in Cloud Computing, Virtualization

Cloud-Based Virtualization

The use of cloud computing services to create virtual versions of physical computing resources, such as servers, storage, and networks. Cloud-based virtualization offers scalability, cost savings, and flexibility, allowing users to provision and manage virtual resources on-demand.

You will find this term commonly used in Cloud Computing, Virtualization

Cloud-Enabled Application Services

Services that provide the tools and platforms necessary for developing, deploying, and managing applications in the cloud. These services leverage cloud computing's scalability and flexibility to enhance application performance, reliability, and development speed.

You will find this term commonly used in Cloud Computing, Software Development

Cloud-Managed Networking

The management and operation of a network infrastructure entirely through cloud-based software and services. Cloud-managed networking offers simplified administration, enhanced visibility and control, and easy scalability for networks of all sizes.

You will find this term commonly used in Networking, Cloud Computing

Cloud-Native Applications

Applications that are specifically designed and developed to run in the cloud, taking full advantage of the cloud computing model. They are built using services and technologies optimized for the cloud environment, enabling them to be scalable, resilient, and agile.

You will find this term commonly used in Cloud Computing, Development

Code Coverage

A measure used in software testing to describe the degree to which the source code of a program is executed when a particular test suite runs. It helps in identifying untested parts of a codebase and ensuring that the most important parts of an application have been tested.

You will find this term commonly used in Software Testing

Code Dependency

A situation in software development where a piece of code or module requires another code segment to function. Managing dependencies is crucial for ensuring that software builds correctly and behaves as expected across different environments and versions.

You will find this term commonly used in Software Development

Code Dependency Management

The practice of tracking and managing the libraries and external pieces of code that a software project depends on. Dependency management tools help ensure that projects have the correct versions of each dependency and can help automate the updating process.

You will find this term commonly used in Software Development, IT Management

Code Deployment

The process of delivering completed software to a runtime environment, making it available for use. Deployment processes can vary from simple manual copying to automated continuous deployment pipelines, involving stages such as testing, staging, and production.

You will find this term commonly used in Software Development, DevOps

Code Injection

The exploitation of a computer bug that is caused by processing invalid data. Injection is used by an attacker to introduce (or "inject") code into a computer program to change the course of execution. The results of a code injection attack can be disastrous, as it can allow attackers to execute arbitrary commands on a vulnerable system.

You will find this term commonly used in Security

Code Injection Vulnerability

A security flaw in an application that allows an attacker to inject malicious code into a program. This can result in unauthorized access, data theft, or control over affected systems. Code injection vulnerabilities are common in web applications and can be mitigated through proper input validation and sanitization.

You will find this term commonly used in Security, Software Development

Code Obfuscation

The practice of deliberately making source code difficult to understand for humans. Obfuscation is used to protect the code from unauthorized access and reverse engineering, particularly in software licensing and protection.

You will find this term commonly used in Software Development, Security

Code Quality Metrics

Quantitative measures used to assess the quality of software code, including its maintainability, readability, complexity, and adherence to coding standards. Code quality metrics help developers identify areas for improvement and ensure that software is reliable, efficient, and easy to maintain.

You will find this term commonly used in Software Development, Quality Assurance

Code Refactoring

The process of restructuring existing computer codeâchanging the factoringâwithout changing its external behavior. Refactoring improves nonfunctional attributes of the software. Advantages include improved code readability and reduced complexity; these can improve source code maintainability and create a more expressive internal architecture or object model to improve extensibility.

You will find this term commonly used in Software Development

What's Your
Career Path?
Comprehensive IT User Support Specialist Training: Accelerate Your Career

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
128 Hrs 51 Min
icons8-video-camera-58
621 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AWS Cloud Practitioner Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
62 Hrs 56 Min
icons8-video-camera-58
475 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Administrator Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
162 Hrs 25 Min
icons8-video-camera-58
524 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
111 Hrs 24 Min
icons8-video-camera-58
518 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
37 Hrs 56 Min
icons8-video-camera-58
193 On-demand Videos

Original price was: $99.00.Current price is: $29.00.

Add To Cart
Kubernetes Certification: The Ultimate Certification and Career Advancement Series

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
12 Hrs 18 Min
icons8-video-camera-58
207 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Pentester Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
100 Hrs 16 Min
icons8-video-camera-58
430 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Manager’s Survival Bundle Training Series – 10 Courses

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
174 Hrs 15 Min
icons8-video-camera-58
773 On-demand Videos

Original price was: $179.00.Current price is: $47.40.

Add To Cart
Data Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
56 Hrs 45 Min
icons8-video-camera-58
358 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Video Editor Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
24 Hrs 2 Min
icons8-video-camera-58
154 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Information Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
58 Hrs 1 Min
icons8-video-camera-58
225 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Google DevOps Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
43 Hrs 22 Min
icons8-video-camera-58
479 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart

Black Friday

70% off

Our Most popular LIFETIME All-Access Pass