IT Glossary - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Cybersecurity Skills Certification

A formal recognition awarded to individuals who have demonstrated a certain level of skill or competence in cybersecurity through the completion of specified courses and exams. Certifications can help professionals validate their expertise, increase employment opportunities, and stay updated with the latest security practices and technologies.

You will find this term commonly used in Cybersecurity, Professional Development

Cybersecurity Skills Gap

The difference between the cybersecurity skills that organizations need to effectively protect their information systems and the skills that the current workforce possesses. The cybersecurity skills gap poses challenges for organizations trying to defend against increasing cyber threats.

You will find this term commonly used in Security, Workforce Development

Cybersecurity Threat Intelligence Platform

A solution that aggregates, correlates, and analyzes threat data from multiple sources to provide actionable intelligence on potential cybersecurity threats. These platforms help organizations stay ahead of cyber threats by providing insights into attacker tactics, techniques, and procedures (TTPs).

You will find this term commonly used in Security, Cybersecurity

Cybersecurity Threat Modeling

The systematic identification and assessment of potential threats to an organization's information systems and data. Threat modeling involves analyzing the attack surface, identifying vulnerabilities, and prioritizing threats based on their severity and likelihood, guiding the development of effective security strategies and controls.

You will find this term commonly used in Cybersecurity, Risk Management

Cybersecurity Training and Awareness

Programs designed to educate employees and users about the importance of cybersecurity, the types of threats that exist, and the best practices for protecting information and systems. Training and awareness programs aim to reduce the risk of human error, which is a leading cause of security breaches.

You will find this term commonly used in Security, Cybersecurity

Cybersecurity Vulnerability Assessment

The process of identifying, quantifying, and prioritizing (or ranking) the vulnerabilities in a system. Vulnerability assessments are used in cybersecurity to detect weaknesses that could be exploited by cyber attacks and to determine the effectiveness of existing security measures.

You will find this term commonly used in Security, Cybersecurity

Cybersecurity Vulnerability Database

A centralized repository that collects, maintains, and disseminates information about identified software vulnerabilities and their potential impacts. These databases are critical resources for cybersecurity professionals, enabling them to stay informed about new vulnerabilities and how to mitigate them.

You will find this term commonly used in Security, Cybersecurity

Cybersecurity Workforce Development

Initiatives and programs aimed at building the skills and capabilities of current and future cybersecurity professionals. Workforce development encompasses education, training, certifications, and awareness efforts to address the cybersecurity skills gap and prepare individuals to effectively combat cyber threats.

You will find this term commonly used in Education, Cybersecurity Workforce

Cybersecurity Workforce Planning

The strategic process of identifying the current and future cybersecurity talent needs of an organization. Workforce planning involves assessing skill gaps, forecasting hiring needs, and developing training and recruitment strategies to build a skilled cybersecurity team capable of protecting against evolving cyber threats.

You will find this term commonly used in Cybersecurity, Human Resources

Data Access Layer (DAL)

An abstraction layer that manages the connection to the database, allowing for data manipulation and retrieval.

You will find this term commonly used in General IT

Data Activation

The process of making data available and usable for various analytical or operational purposes, often in real-time or near-real-time.

You will find this term commonly used in General IT, AI

Data Aggregation

The process of gathering and summarizing information in a structured form for analysis or reporting.

You will find this term commonly used in General IT, AI

Data Analyst

Processes and analyzes datasets to help businesses make informed decisions based on data insights.

You will find this term commonly used in Data Science, Business Intelligence

Data Analytics

The science of analyzing raw data to make conclusions about that information.

You will find this term commonly used in AI, General IT

Data Anonymization

The process of protecting private or sensitive information by erasing or encrypting identifiers that connect an individual to stored data.

You will find this term commonly used in Security, Cybersecurity

Data Architecture

The overall structure of data and data-related resources as an integral part of the enterprise architecture.

You will find this term commonly used in General IT, Networking

Data Binding

The process of connecting a database, UI elements, or other sources of data to data-consuming mechanisms (e.g., a graphical interface).

You will find this term commonly used in General IT, AI

Data Blending

The process of combining data from multiple sources to create a cohesive dataset, often for analytical purposes.

You will find this term commonly used in General IT, AI

Data Block

The smallest unit of data storage that a database can read or write; often contains multiple records or files.

You will find this term commonly used in General IT

Data Broker

A business that collects personal information about consumers and sells that information to other organizations.

You will find this term commonly used in Security, Cybersecurity

Data Brokerage

The act of aggregating, cleaning, and enhancing data from multiple sources and then selling it to parties interested in using it for analysis, marketing, or other purposes.

You will find this term commonly used in Security, Cybersecurity

Data Caching

The process of storing data in a cache, or temporary storage area, for quick access upon request.

You will find this term commonly used in Networking, General IT

Data Capture

The process of collecting, formatting, and storing data in a computer system or database for further analysis or processing.

You will find this term commonly used in General IT

Data Carving

A technique used in digital forensics to extract data from a digital artifact (e.g., a file or a disk) without the aid of file system metadata.

You will find this term commonly used in Security, Cybersecurity

Data Catalog

A collection of metadata, combined with data management and search tools, that helps managers and other users find, understand, and trust the data they need.

You will find this term commonly used in General IT, AI

Data Center

A facility used to house computer systems and associated components, such as telecommunications and storage systems.

You will find this term commonly used in Networking, General IT

Data Churn

The process of cleaning and preparing data by removing or modifying data that is incorrect, incomplete, improperly formatted, duplicated, or irrelevant.

You will find this term commonly used in General IT, AI

Data Classification

The process of organizing data into categories for its most effective and efficient use.

You will find this term commonly used in Security, Cybersecurity

Data Cleansing

The process of detecting and correcting (or removing) corrupt or inaccurate records from a record set, table, or database.

You will find this term commonly used in General IT, AI

Data Clustering

A technique used in machine learning and data mining that involves grouping sets of data points in such a way that objects in the same group (or cluster) are more similar to each other than to those in other groups.

You will find this term commonly used in AI, General IT

Data Cohort

A group of data points or users grouped together for analysis based on shared characteristics or behaviors over a specified time frame.

You will find this term commonly used in AI, General IT

Data Compression

The process of reducing the size of a data file or data transmission to save space or transmission time.

You will find this term commonly used in General IT, Networking

Data Consistency

The guarantee that a read request to a database returns either the most recent write or an error.

You will find this term commonly used in General IT, Networking

Data Consolidation

The process of combining data from multiple sources into a single dataset, often to provide a more unified view or to improve data quality and consistency.

You will find this term commonly used in General IT

Data Consumer

An individual, application, or service that uses data for purposes such as analysis, decision making, or operational support.

You will find this term commonly used in General IT

Data Containment

The strategy of ensuring that data does not leak outside of a designated environment, particularly for privacy and security reasons.

You will find this term commonly used in Security, Cybersecurity

Data Cube

A multi-dimensional array of values, commonly used to describe a dataset in data warehousing scenarios, which allows data to be modeled and viewed in multiple dimensions.

You will find this term commonly used in General IT, AI

Data Curation

The activity of managing and promoting the use of data from its point of creation to ensure it is fit for contemporary purpose and available for discovery and reuse.

You will find this term commonly used in General IT, AI

Data Deduplication

A specialized data compression technique for eliminating duplicate copies of repeating data.

You will find this term commonly used in Networking, General IT

Data Dictionary

A centralized repository of information about data such as meaning, relationships to other data, origin, usage, and format.

You will find this term commonly used in General IT

Data Dredging

The practice of searching through large volumes of data in order to find patterns and correlations, often without a specific hypothesis in mind, which can lead to misleading conclusions.

You will find this term commonly used in AI, General IT

Data Element

An atomic unit of data that has precise meaning or precise semantics.

You will find this term commonly used in General IT

Data Enclave

A secure computing environment used for storing, handling, and analyzing sensitive data, ensuring that access and analysis of the data comply with legal and privacy constraints.

You will find this term commonly used in Security, Cybersecurity

Data Encryption

The process of converting information or data into a code, especially to prevent unauthorized access.

You will find this term commonly used in Security, Cybersecurity

Data Encryption Standard (DES)

A previously widely used symmetric-key algorithm for the encryption of electronic data.

You will find this term commonly used in Security, Cybersecurity

Data Engineering

The aspect of data science that focuses on practical applications of data collection and data analysis.

You will find this term commonly used in General IT, AI

Data Enrichment

The process of enhancing, refining, and improving raw data.

You will find this term commonly used in General IT, AI

Data Entity

A real-world object or concept about which data is stored in a database.

You will find this term commonly used in General IT

Data Ethics

The branch of ethics that studies and evaluates moral problems related to data (including generation, recording, curation, processing, dissemination, sharing, and use), algorithms (artificial intelligence, artificial agents, machine learning), and corresponding practices (responsible innovation, programming, hacking, professional codes), in relation to the moral values and social norms of society.

You will find this term commonly used in Security, Cybersecurity, General IT

Data Exhaust

The data generated as trails or information byproducts resulting from all digital or online activities.

You will find this term commonly used in Security, General IT

What's Your
Career Path?
Network Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
111 Hrs 24 Min
icons8-video-camera-58
518 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Video Editor Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
24 Hrs 2 Min
icons8-video-camera-58
154 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Leadership Mastery: The Executive Information Security Manager

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
95 Hrs 34 Min
icons8-video-camera-58
348 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Manager’s Survival Bundle Training Series – 10 Courses

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
174 Hrs 15 Min
icons8-video-camera-58
773 On-demand Videos

Original price was: $179.00.Current price is: $47.40.

Add To Cart
ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
37 Hrs 56 Min
icons8-video-camera-58
193 On-demand Videos

Original price was: $99.00.Current price is: $29.00.

Add To Cart
Web Designer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
34 Hrs 37 Min
icons8-video-camera-58
172 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Comprehensive IT User Support Specialist Training: Accelerate Your Career

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
128 Hrs 51 Min
icons8-video-camera-58
621 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Information Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
58 Hrs 1 Min
icons8-video-camera-58
225 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Administrator Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
162 Hrs 25 Min
icons8-video-camera-58
524 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Google DevOps Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
43 Hrs 22 Min
icons8-video-camera-58
479 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Project Manager Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AWS Cloud Practitioner Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
62 Hrs 56 Min
icons8-video-camera-58
475 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart

Black Friday

70% off

Our Most popular LIFETIME All-Access Pass