IT Glossary - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Interpretive Simulation

A type of simulation that runs models directly from high-level descriptions at runtime rather than compiling them into machine code, allowing for greater flexibility and ease of model changes.

You will find this term commonly used in AI, Development

Interstitial Advertisement

A full-page ad that appears before the actual webpage. In digital marketing, these ads are used to capture the user's attention while navigating between pages.

You will find this term commonly used in Digital Marketing, Web Development

Intraband Transition

In semiconductor physics, a transition of electrons within the same energy band, affecting the properties and behavior of semiconductors, relevant to the development of electronic and photonic devices.

You will find this term commonly used in Hardware, Development

Intranet Portal

A private network accessible only to an organization's staff, often consisting of a wide range of information and services from the organization's internal IT systems.

You will find this term commonly used in Networking, General IT

Intrusion Detection

The process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents, which are violations or imminent threats of violation of computer security policies.

You will find this term commonly used in Security, Cybersecurity

Intrusion Detection Policy

A set of rules and configurations designed to detect and respond to unauthorized access or anomalies in network traffic.

You will find this term commonly used in Security, Cybersecurity

Intrusion Detection System (IDS)

A device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a management station.

You will find this term commonly used in Security, Cybersecurity

Intrusion Detection System (IDS) Types

Various forms of IDS, including network-based (NIDS), host-based (HIDS), and application-based (AIDS), each designed to detect and potentially thwart unauthorized access or misuse of systems.

You will find this term commonly used in Security, Cybersecurity

Intrusion Prevention System (IPS)

An IT security device that monitors network and/or system activities for malicious activities, logs information about these activities, attempts to block/stop them, and reports them to management.

You will find this term commonly used in Security, Cybersecurity

Intrusion Simulation

The practice of mimicking cyber attack tactics and techniques in a controlled environment to test the effectiveness of security measures and identify vulnerabilities.

You will find this term commonly used in Security, Cybersecurity

Inventory Management Software

Software solutions designed to help businesses manage their inventory levels, orders, sales, and deliveries. It often includes features for product categorization, stock level tracking, and forecasting.

You will find this term commonly used in Business Management, General IT

Inventory Management System

Software tools or physical practices used to track resources and inventory levels within an organization.

You will find this term commonly used in IT Management, Supply Chain

Inverse Multiplexing

The process of combining multiple signals or data streams into one signal over a shared medium.

You will find this term commonly used in Networking, Telecommunications

Inversion of Control (IoC)

A design principle in software engineering where the control of objects or portions of a program is transferred to a container or framework. Itâs often used in the development of applications.

You will find this term commonly used in Software Development

Investigative Data Mining

The process of using data mining techniques to identify patterns or anomalies that could suggest misconduct or criminal activities.

You will find this term commonly used in Data Analysis, Security

Investment Analysis in IT

The process of evaluating and selecting IT projects and assets based on their potential to generate financial returns, considering factors like costs, benefits, risks, and strategic alignment.

You will find this term commonly used in IT Management, Finance

Investment Analysis Software

Tools and platforms used to analyze financial data, assess investment opportunities, and make informed decisions about portfolio management, including features for market analysis, simulation, and reporting.

You will find this term commonly used in Finance, Business Intelligence

Investment in IT Security

The allocation of resources towards protecting information systems and data from cyber threats, including the purchase of security tools, hiring of specialists, and implementation of security measures.

You will find this term commonly used in Security, IT Management

IoC (Inversion of Control) Container

A software design pattern that manages the instantiation and provides the dependencies of classes.

You will find this term commonly used in Software Development

IOPS (Input/Output Operations Per Second)

A performance measurement used to benchmark computer storage devices like hard disk drives (HDD), solid-state drives (SSD), and storage area networks (SAN).

You will find this term commonly used in Hardware, General IT

IoT (Internet of Things)

Refers to the network of physical objects embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet.

You will find this term commonly used in Networking, General IT

IoT Device Management

The process of administering, monitoring, and managing the IoT devices deployed across different environments, including provisioning, firmware updates, and security management.

You will find this term commonly used in IoT, IT Management

IoT Gateway

A device or software application that serves as a connection point between the cloud and controllers, sensors, and intelligent devices in the Internet of Things (IoT). It processes and translates data between different protocols.

You will find this term commonly used in IoT, Networking

IoT Network Protocols

Protocols used in the networking of IoT devices, including MQTT, CoAP, and AMQP, designed for efficient communication in constrained environments or over long distances.

You will find this term commonly used in IoT, Networking

IoT Platform

A suite of components that enable development, deployment, and management of IoT applications and devices, often providing capabilities such as device management, data collection, processing, and analytics.

You will find this term commonly used in IoT, Development

IoT Security

Refers to the safety component tied to the Internet of Things, and involves the safeguarding of connected devices and networks in the IoT.

You will find this term commonly used in Security, Cybersecurity

IoT Security Standards

Guidelines and protocols designed to secure Internet of Things devices and ecosystems from cyber threats, ensuring data privacy and system integrity.

You will find this term commonly used in Security, IoT

IP Address

A unique address that identifies a device on the internet or a local network, allowing for communication between devices.

You will find this term commonly used in Networking

IP Address Assignment

The process of allocating IP addresses to devices on a network, either statically by manual configuration or dynamically using DHCP or similar protocols.

You will find this term commonly used in Networking, IT Management

IP Address Leasing

The dynamic allocation of IP addresses to devices on a network, typically through DHCP.

You will find this term commonly used in Networking, IT Management

IP Address Management (IPAM)

The method by which Internet Protocol (IP) networking addresses (IPv4 and IPv6) are tracked and managed within a network.

You will find this term commonly used in Networking, Security

IP Anycast

A networking technique where a single IP address is assigned to multiple devices on the network, and the network routes the traffic to the nearest device.

You will find this term commonly used in Networking, Internet Technology

IP Canonicalization

The process of redirecting multiple IP addresses to a single primary domain, improving website consistency and preventing duplicate content issues for SEO.

You will find this term commonly used in Networking, Web Development

IP Core

In semiconductor design, a reusable unit of logic or a chip layout design that can be licensed to multiple fabricators or integrators as a building block for different semiconductor products.

You will find this term commonly used in Hardware, Development

IP Fast Reroute (IPFRR)

Mechanisms designed to quickly reroute traffic in the event of a failure within an IP network, minimizing packet loss and downtime.

You will find this term commonly used in Networking, Security

IP Forwarding

The process of sending an Internet Protocol (IP) packet from one network to another, typically performed by routers to direct traffic across the internet or within networks.

You will find this term commonly used in Networking

IP Geolocation

The identification of the geographic location of an IP address in the real world, often used for analytics, content localization, and security purposes.

You will find this term commonly used in Networking, Security

IP Leasing

The allocation of IP addresses for a fixed period of time, after which the IP address is returned to a pool for reassignment. Common in DHCP (Dynamic Host Configuration Protocol) environments.

You will find this term commonly used in Networking

IP Multicast

A method for sending Internet Protocol (IP) datagrams to a group of interested receivers in a single transmission.

You will find this term commonly used in Networking

IP Multicasting

A method of sending internet traffic to multiple recipients simultaneously, used in streaming video and other applications that require real-time broadcasting to multiple locations.

You will find this term commonly used in Networking

IP Spoofing

A technique used by cyber attackers to disguise incoming traffic as coming from a trusted source by forging the IP address. This is often used in denial-of-service attacks.

You will find this term commonly used in Networking, Security

IP Telephony

The use of Internet Protocol's packet-switched connections to exchange voice, fax, and other forms of information traditionally carried over the public switched telephone network (PSTN).

You will find this term commonly used in Networking, Telecommunications

IPL (Initial Program Load)

The process of loading the operating system into the computer's main memory at startup.

You will find this term commonly used in Operating Systems, Hardware

IPS (Intrusion Prevention System)

A network security/threat prevention technology that examines network traffic flows to detect and prevent vulnerability exploits.

You will find this term commonly used in Security, Cybersecurity

IPsec (Internet Protocol Security)

A protocol suite for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session.

You will find this term commonly used in Networking, Security

IPSec VPN Configurations

Configurations of IP Security (IPSec) virtual private networks (VPNs), providing secure internet protocol communications by authenticating and encrypting each IP packet in a data stream.

You will find this term commonly used in Networking, Security

IPT (Intellectual Property Theft)

The act of stealing or using without permission the intellectual property of another individual or company, including patents, copyrights, trademarks, and trade secrets.

You will find this term commonly used in Security, Cybersecurity

IPTC Information Interchange Model

A standard for exchanging metadata and other information between news organizations, covering a wide range of content types including text, images, and video.

You will find this term commonly used in Data Management, Media

IPTV (Internet Protocol Television)

A system through which television services are delivered using the Internet protocol suite over a packet-switched network such as a LAN or the Internet, instead of being delivered through traditional terrestrial, satellite signal, and cable television formats.

You will find this term commonly used in Digital Media, Networking

IPv4

The fourth version of the Internet Protocol, which assigns a unique address to devices on a network for identification and location addressing.

You will find this term commonly used in Networking

What's Your
Career Path?
ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
37 Hrs 56 Min
icons8-video-camera-58
193 On-demand Videos

Original price was: $99.00.Current price is: $29.00.

Add To Cart
Network Administrator Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
162 Hrs 25 Min
icons8-video-camera-58
524 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Entry Level Information Security Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
113 Hrs 4 Min
icons8-video-camera-58
513 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Information Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
58 Hrs 1 Min
icons8-video-camera-58
225 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Manager’s Survival Bundle Training Series – 10 Courses

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
174 Hrs 15 Min
icons8-video-camera-58
773 On-demand Videos

Original price was: $179.00.Current price is: $47.40.

Add To Cart
IT Project Manager Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Leadership Mastery: The Executive Information Security Manager

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
95 Hrs 34 Min
icons8-video-camera-58
348 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Google DevOps Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
43 Hrs 22 Min
icons8-video-camera-58
479 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Web Designer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
34 Hrs 37 Min
icons8-video-camera-58
172 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Video Editor Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
24 Hrs 2 Min
icons8-video-camera-58
154 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AZ-104 Learning Path : Become an Azure Administrator

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
109 Hrs 6 Min
icons8-video-camera-58
433 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Cisco Network Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 56 Min
icons8-video-camera-58
473 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart

Black Friday

70% off

Our Most popular LIFETIME All-Access Pass