Browse Definitions :

Learning Guides

A TechTarget learning guide is an educational tool for a self-directed adult learner who works with information technology. Can't find a guide for the subject you need to learn more about? Let us know!

  • Developer shortage survival guide

    This developer shortage survival guide discusses hiring and training strategies for software developers.

  • CIO guide to project management basics, DevOps and Agile

    In this Essential Guide, learn project management basics and get expert advice on how to get the most out of DevOps and i an Agile digital strategy.

  • Quick Start Glossary: Project Management

    You can print out this glossary for a fast reference to essential project management-related terms. Online, brief explanations are linked to our full definitions of the terms.

  • Game-changing enterprise authentication technologies and standards

    This Security School explores next-generation authentication technologies, standards and methods that may soon replace the personal-password system.

  • The rise of scale-out network-attached storage

    Scale-out NAS is being implemented across the storage landscape, with major vendors and startups releasing new and upgraded products. This guide discusses product offerings and how organizations use scale-out.

  • Security School Course Catalog from

    Check out SearchSecurity's catalog of free online security courses led by information security experts on today's most popular security topics.

  • Distributed denial-of-service attack defense

    This Security School offers need-to-know information about distributed denial-of-service attack defense, prevention and best practices.

  • Performing an authenticated vulnerability scan

    This Security School covers need-to-know topics for performing an authenticated vulnerability scan, including myths and misconceptions to be aware of.

  • Flash options for the array or server

    Many shops are using flash to accelerate mission-critical apps today. Learn the available flash options for deployment.

  • Improving security management with SIEM

    This Security School explains the best methods for infosec pros to effectively use SIM to get the best data in order to improve incident response, change management processes and security policies overall.

  • Managing BYOD endpoint security

    This newly updated Security School lesson breaks down BYOD challenges and help you develop a strategy that cuts across the myriad threats and platforms inside your organization.

  • Windows XP end of life and Windows 7 / Windows 8 migration

    More than 12 years after its release, Windows XP is at the end of its life, at least in terms of support. Microsoft has released a few operating systems since then but many organizations have stuck with XP. For one thing, Vista was as unpopular as XP was popular. Also, most older computers just don’t have the guts, hardware-wise, to run the newer Microsoft systems. Whatever the reasons, though, support is ending and if you’re running XP, you’re going to have to move, accommodate or pay the price. To the rescue: Our guide to XP end of life and Windows 7 / Windows 8 migration.

  • Endpoint security controls: Moving beyond antivirus

    Mike Rothman discusses enterprise endpoint security controls for threat protection and explains how to determine which are best for your enterprise environment.

  • Managing data with an object storage system

    Use this guide to understand everything you need to know about object storage systems as they gain popularity in big data and cloud environments.

  • Next-generation firewalls: Must-have NGFW features

    Gain insight to help you decide whether a next-generation firewall is right for you and how to make its deployment and management smooth and successful.

  • Agile glossary: Words-2-Go

    This Agile glossary provides brief definitions of important terms and concepts in Agile and Scrum software development and project management.

  • Fast Guide to Microsoft's RemoteFX

    This guide covers how Microsoft RemoteFX works, limitations only found in the fine print, and how it compares to remote desktop protocols from VMware, Citrix and Quest Software.

  • SQL Server tutorials's tutorials provide the in-depth information SQL Server database administrators and developers are seeking on Microsoft's flagship database enterprise server, SQL Server and its latest release SQL Server 2008. Our SQL Server tutorials address areas you need to know about, including performance, migration strategies and business intelligence.

  • Learn IT: systems management

    Systems management is the supervision of the information technology systems in an enterprise.

  • Multimedia and Graphics Learning Guides

    We've gathered a our learning resources about multimedia and graphics. You'll find information about DTV, DVD and more. Then see below, our larger collection of resources. Need more basic information before you get started? See our definitions for multimedia, digital multimedia broadcasting, IPTV�and streaming media.

  • Messaging and Email Learning Guides

    We've gathered a collection of our learning guides and tutorials on messaging and email-related topics. You'll find administration tips, and information about application integration, backup and recovery, and dealing with spam -- among other topics. Then see below, our messaging and email-related quizzes and our larger collection of resources. Need more basic information before you get started? See our definitions for email, instant messaging, malware and spam.

  • VoIP Learning Guides

    We've gathered a collection of our learning guides and tutorials on VoIP-related topics. You'll find learning guides about VoIP deployment and administration, security, performance, ROI and more. Then see, below, our VoIP quizzes and cheat sheets and our larger collection of learning resources.

  • SAP Learning Guides

    We've gathered a collection of our learning guides and tutorials on SAP-related topics. You'll find learning guides about ERP, SCM, BI, Business Warehouse, Basis and more. Then see, below, our SAP quizzes and cheat sheets and our larger collection of learning resources.

  • Learn IT: The Power of the Database

    An introduction to the power of the database

  • Compliance Learning Guides

    We've gathered a collection of our learning guides and tutorials about compliance. You'll find in depth information about legislation, such as Sarbanes-Oxley and HIPAA, and standards, such as PCI and FFIEC.



  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...


  • cybersecurity insurance (cybersecurity liability insurance)

    Cybersecurity insurance, also called cyber liability insurance or cyber insurance, is a contract that an entity can purchase to ...

  • phishing

    Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication ...

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.



  • disaster recovery plan (DRP)

    A disaster recovery plan (DRP) is a documented, structured approach that describes how an organization can quickly resume work ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...


  • NVMe over Fabrics (NVMe-oF)

    NVMe over Fabrics, also known as NVMe-oF and non-volatile memory express over fabrics, is a protocol specification designed to ...

  • logical unit number (LUN)

    A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage ...

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...