ITIL® Intermediate Planning, Protection and Optimization

Fourni(e) par

Plus d'information

Description

Type de formation :   | Participants : 10  | Durée : 4 jours

> Objectifs

Following completion of this unit, the candidate will possess knowledge of:

  • The importance of Service Management as a Practice concept and Service Operation Principles, Purpose and Objective 
  • The importance of ITIL Planning, Protection and Optimization while providing service 
  • How all processes in ITIL Planning, Protection and Optimization interact with other Service Lifecycle Processes 
  • The processes, activities, methods and functions used in each of the ITIL Planning, Protection and Optimization processes
  • How to use the ITIL Planning, Protection and Optimization processes, activities and functions to achieve operational excellence 
  • How to measure ITIL Planning, Protection and Optimization 
  • The importance of IT Security and its contributions to ITIL Planning, Protection and Optimization 
  • Understanding of technology and implementation considerations surrounding ITIL Planning, Protection and Optimization Challenges, Critical Success Factors and Risks associated to ITIL Planning, Protection and Optimization 

> Public

IT professionals, business managers and process owners

> Prérequis

Candidates wishing to be trained and examined for this qualification must already hold the ITIL Foundation Certificate in IT Service Management (the V3 Foundation or V2 Foundation plus Bridge Certificate) which shall be presented as documentary evidence to gain admission. It is also strongly recommended that candidates:

  • Can demonstrate familiarity with IT terminology and understand the context of Planning, Protection and Optimization management of their own business environment is strongly recommended. 
  • Have exposure working in the service management capacity within a service provider environment, with responsibility emphasizing on at least one of the following management processes: 
  • Capacity Management Process  
  • Availability Management Process  
  • IT Service Continuity Management (ITSCM) Process 
  • Information Security Management Process 
  • Demand Management Process Challenges, Critical Success Factors and Risk Management For Service Planning, Protection and Optimization. 
  • It is recommended that candidates are familiar with the guidance detailed in the ITIL Service Lifecycle Practices core publications prior to attending training for this certification, in particular, the Service Design publication.

> Programme

Candidates can expect to gain competencies in the following upon successful completion of the education and examination components related to this certification:

  • Service Management as a Practice  
  • Processes across the Service Lifecycle pertaining to the practice elements within Planning, Protection and Optimization 
  • Capacity management as a capability to realise successful service design 
  • Availability management as a capability to realise successful service design 
  • IT Service Continuity Management as a capability to support overall Business Continuity Management 
  • Information security management as part of the overall corporate governance framework 
  • Planning, Protection and Optimization roles and responsibilities 
  • Technology and Implementation Considerations 
  • Challenges, Critical Success Factors and risks And specifically in the following key ITIL process and role areas
  • Capacity Management 
  • Availability Management 
  • IT Service Continuity Management 
  • Information Security Management 
  • Demand Management 
  • Challenges, Critical Success Factors and Risk Management For Service Planning, Protection and Optimization 

The exam is organized 2 weeks after the training. It is a multiple choice, scenario-based closed book examination needing 28/40 or (70%) to pass

Je souhaite plus d'information ou je m'inscris

Date de début Lieu/méthode
Aucune date fixe Liège S'inscrire

Article suggéré

Quatre étudiants sur dix se disent préparés pour une fonction qui n’existe pas encore. C’est ce qui ressort d’une enquête menée par Kaspersky Lab, ...