ITIL® Service Capability: Planning, Protection & Optimisation

The course builds on the principles covered as part of the ITIL Foundation course and is aligned to the 2011 syllabus. The purpose of this training module and the associated exam and certificate is, respectively, to impart, test, and validate the knowledge on industry practices in service management as documented in the ITIL Service Lifecycle core publications.

The ITIL Intermediate Qualification: Planning, Protection and Optimization (PPO) Certificate is a freestanding qualification, but is also part of the ITIL Intermediate Capability stream, and one of the modules that leads to the ITIL Expert Certificate in IT Service Management. The purpose of this training module and the associated exam and certificate is, respectively, to impart, test, and validate the knowledge on industry practices in service management as documented in the ITIL Service Lifecycle core publications.

Objetivos

Capacity management
Availability management
IT service continuity management (ITSCM)
Information security management
Demand management

servicios

Disponible en formato e-learning

Disponible en formato presencial

Disponible en formato a distancia

Subvención disponible
A través de Fundae, cumpliendo requisitos.

Duración
25 horas

  • Dificultad 50% 50%
  • Nivel alcanzado 80% 80%

Dirigido a

Conocimientos requeridos

Temario

Introduction to planning, protection and optimization:

Full understanding of PPO terms and core concepts.
The value to the business of PPO activities
The lifecycle within the PPO context
The urpose and objective of service design as it relates to PPO
The basic service design principles
Learning Unit PPO02: Capacity management:

The knowledge, interpretation and analysis of capacity management principles, techniques and relationships and their correct application to enable effective services planning, protection and optimization.
The end-to-end process flow for capacity management, including its design strategy, components, activities, roles and operation, organizational structure and its interfaces with other processes
A measurement model and the metrics that would be used to support capacity management within PPO practices
The benefits and business value that can be gained from capacity management
Availability management:

The knowledge, interpretation and analysis of availability management principles, techniques and relationships and their correct application to enable effective services planning, protection and optimization.
The end-to-end process flow for availability management, including its design strategy, components, activities, roles and operation, organizational structure and its interfaces with other
processes
The benefits and business value that can be gained from availability management
A measurement model and the metrics that would be used to support availability management within PPO practices
IT service continuity management (ITSCM):

The knowledge, interpretation and analysis of ITSC management principles, techniques and relationships and their correct application to enable effective services planning, protection and optimization.
The end-to-end process flow for ITSCM, including its design strategy, components, activities, roles and operation, organizational structure and its interfaces with other processes
The four stages of ITSCM (i.e. initiation, requirements and strategy, implementation and on-going operation) and how each can be used to support PPO
A measurement model and the metrics used to support ITSCM within PPO practices
The benefits and business value that can be gained from ITSCM
Information security management:

The knowledge, interpretation and analysis of information security management principles, techniques and relationships and their correct application to enable effective services planning,
Oprotection and optimization.
The end-to-end process flow for security management, including its design strategy, components, activities, roles and operation, its organizational structure and its interfaces with other processes
A measurement model and the metrics that would be used to support security management within PPO practices
The benefits and business value that can be gained from security management
Demand management:

The knowledge, interpretation and analysis of demand management principles, techniques and relationships and their correct application to enable effective services planning, protection and optimization.
The end-to-end process flow for demand management, including its design strategy, components, activities, roles and operation, organizational structure and its interfaces with other processes
Activity-based demand management as it relates to business and user activity patterns and how these contribute to core and service packages
The benefits and business value that can be gained from demand management in support of PPO
Planning, protection and optimization roles and responsibilities:
The knowledge, interpretation and analysis of organizational roles, principles, techniques and relationships and their correct application to enable effective services planning, protection and optimization.
The roles and responsibilities related to capacity, availability, ITSCM and information security management, how they fit and are used within the service design organization to support PPO.
Technology and implementation considerations:

The knowledge, interpretation and analysis of technology and implementation principles, techniques and relationships and their correct application to enable effective services planning, protection and optimization.
Service management tools, where and how they can be used within PPO for process implementation
The types of tools that support service design as related to PPO.
What best practices should be used in order to alleviate challenges and risks when implementing service management technologies and designing technology architectures.

Solicita información del curso

It Formacion

It Formacion

Esta web utiliza cookies propias y de terceros para su correcto funcionamiento y para fines analíticos. Contiene enlaces a sitios web de terceros con políticas de privacidad ajenas que podrás aceptar o no cuando accedas a ellos. Al hacer clic en el botón Aceptar, acepta el uso de estas tecnologías y el procesamiento de tus datos para estos propósitos. Ver Política de cookies
Privacidad