Skip to content

Learning Graph Concept List

This list contains 200 concepts for the IT Management Graphs course, organized to support learning progression from foundational knowledge through advanced synthesis.

  1. Configuration Item
  2. Configuration Management
  3. Configuration Management Database
  4. CMDB
  5. Information Technology Infrastructure Library
  6. ITIL
  7. ITIL Version 1
  8. Service Support
  9. Service Delivery
  10. Change Management
  11. Incident Management
  12. Problem Management
  13. Release Management
  14. Configuration Baseline
  15. Configuration Audit
  16. Military-Spec Configuration
  17. Asset Management
  18. IT Asset
  19. Hardware Asset
  20. Software Asset
  21. Relational Database
  22. RDBMS
  23. Structured Query Language
  24. SQL
  25. Database Schema
  26. Table
  27. Column
  28. Row
  29. Primary Key
  30. Foreign Key
  31. Join Operation
  32. Inner Join
  33. Outer Join
  34. Transitive Dependency
  35. Multi-Hop Query
  36. Query Performance
  37. Database Index
  38. Query Optimization
  39. Schema Rigidity
  40. Schema Evolution
  41. Graph Database
  42. Graph Theory
  43. Node
  44. Edge
  45. Vertex
  46. Relationship
  47. Property Graph
  48. Node Property
  49. Edge Property
  50. Graph Traversal
  51. Depth-First Search
  52. Breadth-First Search
  53. Path Finding
  54. Shortest Path
  55. Graph Algorithm
  56. Directed Graph
  57. Undirected Graph
  58. Directed Acyclic Graph
  59. DAG
  60. Cycle Detection
  61. Native Graph Storage
  62. Graph Layer
  63. Neo4j
  64. Cypher Query Language
  65. Graph Query
  66. Pattern Matching
  67. Dependency Tracing
  68. Upstream Dependency
  69. Downstream Dependency
  70. Blast Radius
  71. Impact Analysis
  72. Root Cause Analysis
  73. Change Impact Assessment
  74. Dependency Chain
  75. Dependency Map
  76. Circular Dependency
  77. Service Dependency
  78. Application Dependency
  79. Infrastructure Dependency
  80. Business Service
  81. Technical Service
  82. Service Mapping
  83. Business Service Mapping
  84. Application Portfolio
  85. Digital Estate
  86. IT Portfolio
  87. Technical Debt
  88. Legacy System
  89. System Integration
  90. Data Quality
  91. Data Governance
  92. Data Management
  93. DMBOK
  94. Data Quality Dimension
  95. Accuracy
  96. Completeness
  97. Consistency
  98. Timeliness
  99. Validity
  100. Fitness for Purpose
  101. Data Steward
  102. Data Owner
  103. Data Custodian
  104. Metadata
  105. Data Lineage
  106. Data Catalog
  107. Master Data Management
  108. Reference Data
  109. Real-Time Query
  110. Query Latency
  111. Response Time
  112. Performance Metric
  113. Scalability
  114. Horizontal Scaling
  115. Vertical Scaling
  116. Graph Complexity
  117. Graph Density
  118. Node Degree
  119. In-Degree
  120. Out-Degree
  121. Graph Metric
  122. Observability
  123. Monitoring
  124. Telemetry
  125. OpenTelemetry
  126. eBPF
  127. Extended Berkeley Packet Filter
  128. Automated Discovery
  129. Auto-Discovery
  130. Network Topology
  131. Service Topology
  132. Dynamic Topology
  133. Configuration Drift
  134. Drift Detection
  135. Compliance
  136. Regulatory Compliance
  137. HIPAA
  138. Health Insurance Portability
  139. GDPR
  140. General Data Protection Regulation
  141. DORA
  142. Digital Operational Resilience Act
  143. Audit Trail
  144. Compliance Reporting
  145. Risk Management
  146. Risk Assessment
  147. Vendor Management
  148. ServiceNow
  149. Dynatrace
  150. Atlassian
  151. Vendor Evaluation
  152. Technology Selection
  153. Build vs Buy
  154. Total Cost of Ownership
  155. TCO
  156. Return on Investment
  157. ROI
  158. Business Case
  159. Digital Transformation
  160. IT Modernization
  161. Legacy Migration
  162. Migration Strategy
  163. Data Migration
  164. System Cutover
  165. Artificial Intelligence
  166. Machine Learning
  167. AI-Assisted Curation
  168. Graph RAG
  169. Retrieval Augmented Generation
  170. Knowledge Graph
  171. Semantic Model
  172. Ontology
  173. Taxonomy
  174. Classification System
  175. Exception Reporting
  176. Anomaly Detection
  177. Data Validation
  178. Validation Rule
  179. Business Rule
  180. Policy Enforcement
  181. Access Control
  182. Role-Based Access Control
  183. RBAC
  184. Security Model
  185. Incident Response
  186. Mean Time to Detect
  187. MTTD
  188. Mean Time to Resolve
  189. MTTR
  190. Service Level Agreement
  191. SLA
  192. Key Performance Indicator
  193. KPI
  194. Operational Excellence
  195. Continuous Improvement
  196. Best Practice
  197. Industry Standard
  198. Framework Adoption
  199. Process Maturity
  200. Capability Model