The purpose of this ITIL PPO Certification Training course is to impart, test, and validate your knowledge of industry practices in service management, as documented in the ITIL Service Lifecycle core publications. Upon completion, you’ll know how to apply PPO practices to the service management lifecycle in areas such as capacity management.
Program Features
8 end-of-chapter quizzes
2 sample test papers
16 PDUs offered
Delivery Mode
Online-Self Learning
This is a fully online self-paced learning course.
Prerequisites
To be eligible for the examination leading to the ITIL Intermediate PPO Certificate, the candidate should take the training with an accredited training organization. You need to hold an ITIL Foundation Certificate in IT service management. In addition, you also need two to four years of professional experience working in IT service management is highly desirable. It is also recommended that you complete a minimum of 12 hours of personal study by reviewing the course content.
Target Audience
ITSM Manager
Service Delivery Manager
Key Learning Outcomes
Certified PPO professionals are well compensated for their skills and expertise, with a premium pay scale compared to non-certified peers. Certified professionals in this field are paid a median annual salary of $100,000, according to recent surveys by payscale.com.
Course Curriculum
Purpose and objectives and value of service design
The lifecycle in context
Service design basics
The interfaces of design coordination with other processes related to PPO
The purpose and objectives of the Capacity management process
The scope of the Capacity management
The importance of capacity management as a process to generate business value
Capacity management policies, principles and basic concepts
The main activities, methods and techniques that enable capacity management, and how they relate to planning, protection and optimization
The triggers, inputs, outputs and interfaces of capacity management and its interfaces with other processes
How the critical success factors and key performance indicators can be used to demonstrate the efficiency and effectiveness of successful capacity management
Challenges and risks of capacity management
The purpose and objectives of the process
The scope of the process
The importance of availability management as a process to generate business value
Availability management policies, principles and basic concepts
The main activities, methods and techniques that enable availability management and how they relate to PPO
The triggers, inputs, outputs and interfaces of availability management, and its interface with other processes
How the critical success factors and key performance indicators can be used to demonstrate the efficiency and effectiveness of successful availability management
Challenges and risks of availability management
The purpose and objectives of the process
The scope of the process
The importance of ITSCM as a process to generate business value
ITSCM policies, principles and basic concepts
The main activities, methods and techniques that enable ITSCM, and how they relate to planning, protection and optimization, particularly stages 1-4 of the ITSCM lifecycle:
Initiation
Requirement and strategy
Implementation
Ongoing operation
Invocation of ITSCM
Information management for ITSCM
How the critical success factors and key performance indicators can be used and applied to demonstrate the efficiency and effectiveness of successful IT service continuity management
Challenges and risks of ITSCM
The purpose and objectives of the process
The scope of the process
The importance of information security management as a process to generate business value
Information security management policies, principles and basic concepts
The main activities, methods and techniques that enable this process and how they relate to planning, protection and optimization
The triggers, inputs, outputs and interfaces of information security management
Information management within the problem management process
How the critical success factors and key performance indicators can be used and applied to demonstrate the efficiency and effectiveness of successful information security management
Challenges and risks of ISM
Purpose and objectives of demand management
Scope of demand management
Value to business
Policies, principles and basic concepts
Process activities, methods and techniques of demand management
Triggers, inputs, outputs and interfaces
Critical success factors and key performance indicators
Challenges and risks of demand management
Process manager
Process practitioner
Capacity management process manager
Availability management process manager
ITSCM process manager
ISM process manager
The generic requirements for technology to assist service design
The evaluation criteria for technology and tooling for process implementation
The good practices for practice and process implementation
The challenges, critical success factors and risks related to implementing practices and processes
How to plan and implement service management technologies
The consideration for implementing technologies in supporting the processes within planning, protection andoptimization practice, in particular, designing technology architectures