Different types of VLANs exist on campus enviroments and here they are:
Default VLAN: This is basically where ALL ports belongs to by default, this is tecnically VLAN 1 and it can't be deleted from the switch. On some (old )Catalyst switches you can't even disallow VLAN 1 from trunk ports.
Data VLAN: This is the "normal" VLAN where the traffic is carried and where the client data goes through the LAN.
Native VLAN: The native VLAN is an 802.1Q only concept. Traffic belonging to the native VLAN is not tagged. Note that by default VLAN 1 (which is the default VLAN) is the native VLAN on ALL Catalyst switches. You can designate any VLAN as your native on your switch and note that it need to match on both ends of the trunk connection.
Voice VLAN: The voice VLAN is where the QoS policies are applied in order to prioritize this traffic to send it through the LAN. The voice traffic it's always distinguished from the data traffic on the LAN.
Management VLAN: This is used on a LAN for management purporses. Example of this would be to use it on a Out-of-Band (OOB) implementations. This VLAN normally carries sensitive traffic from a control perspective; some of the protocols that are carried on this VLAN are: FTP, TFTP, Telnet, SSH, SCP, and others.
Special VLANs: These VLANs are basically used for special cases on your LAN. An example of a special case VLAN would be VLAN 0, which is used in conjunction with 802.1p. I would say that VLAN 1 fits in this "special" category too.
Reserved VLANs: There are some VLANs that are reserved internally on your switch in order to use them on other enviroments like FDDI, Token Ring. The specific VLANs used for these two types of networks are from 1002 - 1005.
Private VLANs it's a technology that has some new concpets/category of VLANs, but these are not a CCNA R&S related topic.