IT Glossary - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Search Algorithm

An algorithm for finding an item with specified properties among a collection of items. It can be either a general algorithm or a domain specific search algorithm.

You will find this term commonly used in Software Development, Algorithms

Search Engine

A program or website that enables users to search for information on the internet by entering keywords or phrases.

You will find this term commonly used in General IT

Search Engine Optimization (SEO)

The process of improving the quality and quantity of website traffic by increasing the visibility of a website or a web page to users of a web search engine.

You will find this term commonly used in General IT, Marketing

Secure Access Service Edge (SASE)

A network architecture that combines VPN and SD-WAN capabilities with cloud-native security functions.

You will find this term commonly used in Networking, Security

Secure Boot

A security feature that ensures only trusted software is executed during the boot process of a computer system.

You will find this term commonly used in Security, General IT

Secure Coding

Practices that aim to write software in such a way that prevents the introduction of security vulnerabilities.

You will find this term commonly used in Software Development, Security

Secure Shell (SSH)

A cryptographic network protocol for secure communication over an unsecured network.

You will find this term commonly used in Security

Secure Socket Layer (SSL)

Secure Socket Layer (SSL) is a cryptographic protocol that ensures secure communication over a computer network by encrypting data transmitted between clients and servers, preventing unauthorized access and data tampering.

You will find this term commonly used in Security, Networking, Cryptography

Security

The protection of computer systems, networks, and data from unauthorized access, attacks, damage, or theft.

You will find this term commonly used in Security, Cybersecurity

Security Assertion Markup Language (SAML)

An open standard that allows identity providers to pass authorization credentials to service providers.

You will find this term commonly used in Security, Web Development

Security Breach

Unauthorized access to, or disclosure of, sensitive information, usually as a result of a cyber attack or data breach.

You will find this term commonly used in Cybersecurity, Security

Security Engineer

Designs and implements systems and measures to protect an organization's data and infrastructure from cyber threats.

You will find this term commonly used in Cybersecurity, IT Security

Security Operations Center (SOC)

A centralized unit that deals with security issues on an organizational and technical level.

You will find this term commonly used in Security, Cybersecurity

Security Token

A physical or digital device that provides two factor authentication for a user to prove their identity in a login process.

You will find this term commonly used in Cybersecurity

Self-Driving Cars

Autonomous vehicles equipped with sensors and software to navigate and operate without human input.

You will find this term commonly used in AI, Robotics, General IT

Self-Healing

The ability of a system or network to automatically detect and recover from failures or errors.

You will find this term commonly used in General IT, Networking

Semantic Analysis

The process of understanding the meaning and interpretation of words, phrases, and sentences in the context of a language.

You will find this term commonly used in AI, Natural Language Processing

Semantic Web

An extension of the World Wide Web through standards by the World Wide Web Consortium (W3C). It promotes common data formats and exchange protocols on the Web.

You will find this term commonly used in General IT, Web Development

Semiconductor

A material that has a conductivity between conductors (usually metals) and nonconductors or insulators (such as most ceramics). Semiconductors are used in the manufacture of various kinds of electronic devices.

You will find this term commonly used in Hardware, Electronics

Sensor

A device that detects or measures physical properties and converts them into signals that can be interpreted and used by computers.

You will find this term commonly used in General IT

SEO (Search Engine Optimization)

The process of improving the quality and quantity of website traffic by increasing the visibility of a website or a web page to users of a web search engine.

You will find this term commonly used in General IT, Marketing

Serialization

The process of converting an object into a stream of bytes to store the object or transmit it to memory, a database, or a file.

You will find this term commonly used in Software Development, Programming

Server

A computer or software system that provides resources, data, or services to other computers or devices on a network.

You will find this term commonly used in Networking

Server Farm

A group of computer servers used for IT purposes that are co-located in one or more data centers, used to provide redundancy and efficient processing.

You will find this term commonly used in Networking, Cloud Computing

Server Virtualization

The partitioning of a physical server into multiple virtual servers, allowing multiple operating systems and applications to run independently on a single hardware platform.

You will find this term commonly used in Virtualization, General IT

Server-Side

Refers to operations that are performed by the server in a client-server relationship in computer networking.

You will find this term commonly used in Web Development

Serverless Architecture

An architectural pattern where computing resources are provided as scalable cloud services, allowing developers to build and run applications without managing servers.

You will find this term commonly used in Cloud Computing, Serverless Computing

Serverless Computing

Serverless computing, also known as function as a service (FaaS), is a cloud computing model where cloud providers dynamically manage server resources, allowing developers to focus on writing and deploying code without managing servers.

You will find this term commonly used in Cloud Computing, Software Development

Service Discovery

A method used in microservices architectures to detect the location of services running in a network in order to facilitate communication between services.

You will find this term commonly used in Networking, Microservices

Service Fabric

A distributed systems platform that makes it easy to package, deploy, and manage scalable and reliable microservices and containers.

You will find this term commonly used in Cloud Computing, Microservices

Service Level Agreement (SLA)

A contract between a service provider and a customer that outlines the expected level of service.

You will find this term commonly used in General IT

Service Mesh

A dedicated infrastructure layer for facilitating service-to-service communications between services or microservices, using a transparent proxy.

You will find this term commonly used in Networking, Microservices

Service Mesh Interface (SMI)

A standard interface for service meshes on Kubernetes. It defines a set of common, portable APIs.

You will find this term commonly used in Networking, Cloud Computing

Service-Oriented Architecture (SOA)

Service-Oriented Architecture (SOA) is a software design approach where applications are composed of interoperable services that can be accessed and combined as needed to fulfill specific business requirements and processes.

You will find this term commonly used in Software Architecture, Integration, Enterprise Systems

Session Initiation Protocol (SIP)

A signaling protocol used for initiating, maintaining, and terminating real-time sessions that include voice, video and messaging applications.

You will find this term commonly used in Networking, Telecommunications

SHA (Secure Hash Algorithm)

A family of cryptographic hash functions designed by the National Security Agency (NSA) to ensure data integrity.

You will find this term commonly used in Security, Cryptography

Shadow Copy

A technology included in Microsoft Windows that allows taking manual or automatic backup copies or snapshots of data.

You will find this term commonly used in Data Management, Operating Systems

Shadow IT

The use of information technology systems, devices, software, applications, and services without explicit IT department approval.

You will find this term commonly used in Security, Cybersecurity

Sharding

A type of database partitioning that separates very large databases the into smaller, faster, more easily managed parts called data shards.

You will find this term commonly used in Software Development, Database Management

Shared Hosting

A type of web hosting service where many websites reside on one web server connected to the Internet, making it a cost-effective option for hosting.

You will find this term commonly used in General IT, Web Hosting

SharePoint

A web-based collaborative platform that integrates with Microsoft Office. Primarily sold as a document management and storage system.

You will find this term commonly used in Software, Collaboration Tools

Shell

A user interface for accessing an operating system's services and functions, often through a command-line interface.

You will find this term commonly used in Operating Systems, General IT

Shell Script

A computer program designed to be run by the Unix shell, a command-line interpreter. The various dialects of shell scripts are considered to be scripting languages.

You will find this term commonly used in Software Development, System Administration

SIEM (Security Information and Event Management)

A set of tools and services offering a holistic view of an organizationâs information security, providing real-time analysis of security alerts generated by applications and network hardware.

You will find this term commonly used in Security, Cybersecurity

Signal Processing

The analysis, interpretation, and manipulation of signals. Signals of interest can include sound, electromagnetic radiation, images, and sensor readings.

You will find this term commonly used in AI, Data Science

Signature-Based Detection

A method used in antivirus software to identify malware by comparing the contents of a file to a database of known malware signatures.

You will find this term commonly used in Cybersecurity

SIMD (Single Instruction, Multiple Data)

A class of parallel computers in Flynn's taxonomy, it describes computers with multiple processing elements that perform the same operation on multiple data points simultaneously.

You will find this term commonly used in General IT, Parallel Computing

Simulated Annealing

A probabilistic technique for approximating the global optimum of a given function. Specifically, it is a metaheuristic to approximate global optimization in a large search space.

You will find this term commonly used in AI, Optimization Algorithms

Single Sign-On (SSO)

Single sign-on (SSO) is an authentication process that allows users to access multiple applications or systems with a single set of login credentials, enhancing security, user experience, and productivity while reducing password fatigue.

You will find this term commonly used in Security, Identity Management, Authentication

Single-Page Application (SPA)

A web application or website that interacts with the user by dynamically rewriting the current page rather than loading entire new pages from the server.

You will find this term commonly used in Web Development

What's Your
Career Path?
Leadership Mastery: The Executive Information Security Manager

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
95 Hrs 34 Min
icons8-video-camera-58
348 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Data Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
56 Hrs 45 Min
icons8-video-camera-58
358 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Administrator Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
162 Hrs 25 Min
icons8-video-camera-58
524 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Entry Level Information Security Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
113 Hrs 4 Min
icons8-video-camera-58
513 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Video Editor Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
24 Hrs 2 Min
icons8-video-camera-58
154 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
37 Hrs 56 Min
icons8-video-camera-58
193 On-demand Videos

Original price was: $99.00.Current price is: $29.00.

Add To Cart
AZ-104 Learning Path : Become an Azure Administrator

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
109 Hrs 6 Min
icons8-video-camera-58
433 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Kubernetes Certification: The Ultimate Certification and Career Advancement Series

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
12 Hrs 18 Min
icons8-video-camera-58
207 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Web Designer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
34 Hrs 37 Min
icons8-video-camera-58
172 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Pentester Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
100 Hrs 16 Min
icons8-video-camera-58
430 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Project Manager Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Information Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
58 Hrs 1 Min
icons8-video-camera-58
225 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart

Cyber Monday

70% off

Our Most popular LIFETIME All-Access Pass