Overview
The ITIL Intermediate: Planning, Protection & Optimisation course will teach individuals how to master the ITIL key processes that are required within an organisation to create a stable IT infrastructure. It is a comprehensive course that focuses on the practical application of PPO practice to enable IT service continuity, capacity, availability and information security. Individuals will gain in-depth knowledge on the application of ITIL concepts, organisational roles, structure, process activities and functions related to processes within an IT enterprise. The course will give focus to ensure user requirements are met through new and updated technology and services. The key objective of the course is to apply service management as a practice and create business value.
The ITIL Intermediate: Planning, Protection & Optimisation course will discuss PPO in the context of service life-cycle, service design basics and service optimisation.
The ITIL Intermediate: Planning, Protection & Optimisation course will give learners the skills and knowledge of the key processes and its associated roles, functions, responsibilities, risks and critical success factors. The PPO course is worth 4 credits with learners having to achieve a minimum of 17 credits required before the final step of ITIL Expert Level. The course is globally recognised and accredited to a training organisation and you will be issued an internationally recognised qualification following full completion of the ITIL Intermediate: Planning, Protection & Optimisation course.
Why consider learning at Study 365?
With so many commitments in our lives, we may not have the time to learn new skills. The beauty of studying online is that you get to find this balance between your education and your daily commitments.
Study 365 offers hundreds of online courses to students across the world. Gaining new skills has never been this easy as many of our courses are open to students with little or no qualifications or previous experience. All the courses are up-to-date, relevant, affordable, and will build on existing expertise or give you a jump-start to a new career. The courses are meticulously designed and equals what is offered in a classroom setting. With a solid reputation that has established and made us made us one of the most trusted and reliable online course providers we offer the most convenient path to gain recognised skills and training that will give you the opportunity to put into practice your knowledge and expertise in your chosen career. You can learn at your own pace at Study 365 and you will be provided with all the necessary material, tutorials, qualified course instructor, narrated e-learning modules, interactive quizzes and free resources which include Free CV writing pack, free career support and course demo to make your learning experience enriching and more rewarding.
Learning Outcomes
- Gain an understanding of the PPO process and plan activities accordingly.
- Understand capacity management and ensure that costs are justifiable in the capacity and are matched to the needs of the organisation.
- Learn about availability management and how the level of service availability is matched or exceed the organisational requirements.
- Learn IT service continuity management and how it aligns IT and business security.
- Understand the role of design coordination within PPO.
Access Duration
The course will be directly delivered to you, and you have 12 months access to the online learning platform from the date you joined the course. The course is self-paced and you can complete it in stages, revisiting the lectures at any time.
Who is this Course aimed at?
- The course is aimed at Security Managers and Security Administrators.
- Change Manager
- Application Support / Network Support
- Availability Manager
- Individuals working in roles within service based business models who want to enhance their knowledge of concepts, functions and processes related to service operation.
Entry Requirements
- The course requires that learners have an understanding of the ITIL Foundation course.
Method of Assessment
At the end of the ITIL Intermediate: Planning, Protection & Optimisation course you will be required to take a multiple choice question assessment test comprising of 8 questions per paper in 90 minutes duration. (28 marks required to pass out of 40) The multiple choice question assessment will be automatically marked with learners receiving an instant grade. The pass mark is 70%, closed book.
Please Note: Additionally, £210 is charged for the official exam and you are required to pay this when you are ready to face your examination.
Certification
Those who successfully complete the exam will be awarded the certificate in ITIL Intermediate: Planning, Protection & Optimisation.
Awarding Body
The certificate will be awarded by Axelos. This is a globally recognised best practice qualification that will make your CV standout and encourage employers to see your motivation at expanding your skills and knowledge in the IT enterprise.
Progression and Career Path
Once you successfully complete ITIL Intermediate: Planning, Protection & Optimisation you will be qualified to work in the following positions. The ITIL qualification will also put you in line to demand a higher salary or job promotion. The average UK salary per annum according to https://www.payscale.com is given below.
- IT Operations Manager – (average UK yearly salary: £45,537)
- IT Security Manager – (average UK yearly salary: £50,473)
- Business Continuity Manager – (average UK yearly salary: £45,657)
- Release Manager – (average UK yearly salary: £39,663)
- Service Portfolio Manager – (average UK yearly salary: £55,284)
Other Jobs you can get
- Capacity Manager
- Security Administrator
- Supplier Relationship Manager
ITIL®, RESILIA™, PRINCE2®, and the Swirl logo™ are registered trade marks of the AXELOS Limited, used under permission of AXELOS. All rights reserved.
Course Curriculum
➤ Module 01: Course Introduction – Vo | |||
1.0 Lesson: Course Organization | |||
Course Introduction Part 1 | 00:00:00 | ||
Course Introduction Part 2 | 00:00:00 | ||
Course Organization | 00:00:00 | ||
Welcome to the Course! | 00:00:00 | ||
Mentoring Community Introductions | 00:00:00 | ||
Why Are You Here? | 00:00:00 | ||
Using Bloom’s Taxonomy | 00:00:00 | ||
What do you Expect? | 00:00:00 | ||
Housekeeping Online | 00:00:00 | ||
2.0 Lesson: Course Conventions & Agenda | |||
Course Conventions & Agenda | 00:00:00 | ||
Conventions Used | 00:00:00 | ||
Quizzes & Exercises | 00:00:00 | ||
ITIL Qualification Scheme | 00:00:00 | ||
ITIL Intermediate Exams | 00:00:00 | ||
Getting Started with an Online Class | 00:00:00 | ||
Chapter 01 Review | 00:00:00 | ||
➤ Module 02: Planning, Protection, And Optimization | |||
1.0 Lesson: introduction to planning, protection & optimization | |||
Introduction to Planning, Protection & Optimization Part 1 | 00:00:00 | ||
Introduction to Planning, Protection & Optimization Part 2 | 00:00:00 | ||
The Service Lifecycle | 00:00:00 | ||
Managing Across the Lifecycle | 00:00:00 | ||
Purpose, Goals & Objectives of Service Design | 00:00:00 | ||
Scope of Service Design | 00:00:00 | ||
Value of Service Design | 00:00:00 | ||
Planning, Protection & Optimization | 00:00:00 | ||
The Context of Service Design | 00:00:00 | ||
Conceptual Framework | 00:00:00 | ||
Principles & Processes | 00:00:00 | ||
2.0 Lesson: Principles | |||
Principles | 00:00:00 | ||
Principles of Service Design | 00:00:00 | ||
Designing Service Solutions | 00:00:00 | ||
Planning | 00:00:00 | ||
Design Coordination Overview | 00:00:00 | ||
Service Design Package | 00:00:00 | ||
Requirements | 00:00:00 | ||
Management Systems | 00:00:00 | ||
Design Architecture & Support Technology | 00:00:00 | ||
Design Support Processes | 00:00:00 | ||
Design Measurement Systems | 00:00:00 | ||
Metrics Tree | 00:00:00 | ||
Protection | 00:00:00 | ||
Continuity | 00:00:00 | ||
Security | 00:00:00 | ||
Optimization | 00:00:00 | ||
Performance Tuning | 00:00:00 | ||
Operational Process Support | 00:00:00 | ||
Challenges & Risks | 00:00:00 | ||
Challenges | 00:00:00 | ||
Risks | 00:00:00 | ||
Service Design Critical Success Factors | 00:00:00 | ||
PPO Processes Across the Lifecycle | 00:00:00 | ||
PPO Processes | 00:00:00 | ||
3.0 lesson: Ppo Summary | |||
PPO Summary Part 1 | 00:00:00 | ||
PPO Summary Part 2 | 00:00:00 | ||
Checkpoint | 00:00:00 | ||
Chapter 02 Review | 00:00:00 | ||
➤ Module 03: Ppo Processes | |||
1.0 Lesson: Availability Management | |||
Availability Management Part 1 | 00:00:00 | ||
Availability Management Part 2 | 00:00:00 | ||
Introduction | 00:00:00 | ||
Purpose, Goals & Objectives | 00:00:00 | ||
Scope | 00:00:00 | ||
Value to the Business | 00:00:00 | ||
Concepts | 00:00:00 | ||
Availability Focus | 00:00:00 | ||
Activities | 00:00:00 | ||
Reactive Activities | 00:00:00 | ||
Monitoring | 00:00:00 | ||
Measurement | 00:00:00 | ||
Analysis | 00:00:00 | ||
Expanded Incident Lifecycle | 00:00:00 | ||
Availability Formulas | 00:00:00 | ||
Service Failure Analysis (SFA) | 00:00:00 | ||
SFA Structure | 00:00:00 | ||
Reporting | 00:00:00 | ||
Proactive Activities | 00:00:00 | ||
Determine Availability Requirements | 00:00:00 | ||
Availability Design Concepts | 00:00:00 | ||
Design for Availability | 00:00:00 | ||
Failure Analysis | 00:00:00 | ||
SPoF Techniques | 00:00:00 | ||
Fault Tree Analysis | 00:00:00 | ||
Modeling | 00:00:00 | ||
Risk Analysis & Management | 00:00:00 | ||
Triggers, Inputs & Outputs | 00:00:00 | ||
Relationships | 00:00:00 | ||
Information | 00:00:00 | ||
Critical Success Factors | 00:00:00 | ||
Challenges & Risks | 00:00:00 | ||
Availability Management Summary | 00:00:00 | ||
2.0 Lesson: Capacity Management | |||
Capacity Management | 00:00:00 | ||
Introduction | 00:00:00 | ||
Purpose, Goals & Objectives | 00:00:00 | ||
Scope | 00:00:00 | ||
Value to the Business | 00:00:00 | ||
Concepts | 00:00:00 | ||
Activities | 00:00:00 | ||
Sub-Process Areas | 00:00:00 | ||
Underpinning Activities | 00:00:00 | ||
Tuning & Optimization | 00:00:00 | ||
Performance Tuning | 00:00:00 | ||
Threshold Management & Control | 00:00:00 | ||
Demand Management | 00:00:00 | ||
Modeling & Trending | 00:00:00 | ||
Application Sizing | 00:00:00 | ||
Triggers, Inputs & Outputs | 00:00:00 | ||
Relationships | 00:00:00 | ||
Information | 00:00:00 | ||
Critical Success Factors | 00:00:00 | ||
Challenges & Risks | 00:00:00 | ||
Capacity Management Summary | 00:00:00 | ||
3.0 Lesson: It Service Continuity Management | |||
IT Service Continuity Management | 00:00:00 | ||
Introduction | 00:00:00 | ||
Purpose, Goals & Objectives | 00:00:00 | ||
Scope | 00:00:00 | ||
Value to the Business | 00:00:00 | ||
Concepts | 00:00:00 | ||
Activities | 00:00:00 | ||
Initiation | 00:00:00 | ||
Requirements & Strategy | 00:00:00 | ||
Business Impact Analysis | 00:00:00 | ||
Risk Analysis | 00:00:00 | ||
Strategy | 00:00:00 | ||
Implementation | 00:00:00 | ||
Organizational & Implementation Planning | 00:00:00 | ||
Testing | 00:00:00 | ||
Invocation | 00:00:00 | ||
On-going Operation | 00:00:00 | ||
Triggers, Inputs & Outputs | 00:00:00 | ||
Relationships | 00:00:00 | ||
Information | 00:00:00 | ||
CSFs | 00:00:00 | ||
Challenges & Risks | 00:00:00 | ||
IT Service Continuity Summary | 00:00:00 | ||
4.0 Lesson: Information Security Management | |||
Information Security Management | 00:00:00 | ||
Introduction | 00:00:00 | ||
Purpose, Goals & Objectives | 00:00:00 | ||
Scope | 00:00:00 | ||
Value to the Business | 00:00:00 | ||
Concepts | 00:00:00 | ||
Security Management Framework | 00:00:00 | ||
Activities | 00:00:00 | ||
Information Security Process | 00:00:00 | ||
Establish Information Security Policy | 00:00:00 | ||
Enforce Security Policy | 00:00:00 | ||
Assess & Classify Information Assets | 00:00:00 | ||
Security Controls & Risk Assessment | 00:00:00 | ||
Monitor & Manage Security Breach | 00:00:00 | ||
Analyze, Report & Reduce Impact | 00:00:00 | ||
Conduct Security Reviews & Audits | 00:00:00 | ||
Triggers, Inputs & Outputs | 00:00:00 | ||
Relationships | 00:00:00 | ||
Information | 00:00:00 | ||
CSFs | 00:00:00 | ||
Challenges & Risks | 00:00:00 | ||
Information Security Management Summary | 00:00:00 | ||
5.0 Lesson: Demand Management | |||
Demand Management | 00:00:00 | ||
Introduction | 00:00:00 | ||
Purpose, Goals & Objectives | 00:00:00 | ||
Scope | 00:00:00 | ||
Value to the Business | 00:00:00 | ||
Concepts | 00:00:00 | ||
Activity-Based Demand Management | 00:00:00 | ||
Business Activity Patterns | 00:00:00 | ||
Patterns of Business Activity | 00:00:00 | ||
User Profile | 00:00:00 | ||
Matching UP to PBA | 00:00:00 | ||
Demand Modeling | 00:00:00 | ||
Managing Demand | 00:00:00 | ||
Service Packages | 00:00:00 | ||
Triggers, Inputs & Outputs | 00:00:00 | ||
Relationships | 00:00:00 | ||
Information | 00:00:00 | ||
Critical Success Factors | 00:00:00 | ||
Challenges & Risks | 00:00:00 | ||
Summary | 00:00:00 | ||
6.0 Lesson: Ppo Processes Summary | |||
PPO Processes Summary Part 1 | 00:00:00 | ||
PPO Processes Summary Part 2 | 00:00:00 | ||
Checkpoint | 00:00:00 | ||
Chapter 03 Review | 00:00:00 | ||
➤ Module 04: Organize And Implement – Vo | |||
1.0 Lesson: Organize For Ppo | |||
Organize for PPO Part 1 | 00:00:00 | ||
Organize for PPO Part 2 | 00:00:00 | ||
Organize for PPO Part 3 | 00:00:00 | ||
Who Does What to Whom? | 00:00:00 | ||
The RACI Model | 00:00:00 | ||
Functional Roles Analysis | 00:00:00 | ||
Activity Analysis | 00:00:00 | ||
Roles & Responsibilities | 00:00:00 | ||
Service Owner | 00:00:00 | ||
Process Owner | 00:00:00 | ||
Process Manager | 00:00:00 | ||
Process Practitioner | 00:00:00 | ||
Availability Management | 00:00:00 | ||
Capacity Management | 00:00:00 | ||
IT Service Continuity Management | 00:00:00 | ||
Security Management | 00:00:00 | ||
Demand Management | 00:00:00 | ||
2.0 Lesson: Technology Considerations | |||
Technology Considerations Intro | 00:00:00 | ||
Technology Considerations | 00:00:00 | ||
Service Management Tools | 00:00:00 | ||
Technology-Related Areas | 00:00:00 | ||
Requirements Engineering | 00:00:00 | ||
Requirement Types | 00:00:00 | ||
Functional Requirements | 00:00:00 | ||
Management & Operational Requirements | 00:00:00 | ||
Usability | 00:00:00 | ||
Investigation Techniques | 00:00:00 | ||
Issues | 00:00:00 | ||
Documenting Requirements | 00:00:00 | ||
Requirements Catalog | 00:00:00 | ||
Outsourcing Requirements | 00:00:00 | ||
Data & Information Management | 00:00:00 | ||
Key Factors in Data Management | 00:00:00 | ||
Scope of Data Management | 00:00:00 | ||
Activities of Data Management | 00:00:00 | ||
Application Management | 00:00:00 | ||
Application & Service Portfolios | 00:00:00 | ||
Application Frameworks | 00:00:00 | ||
Design of Applications | 00:00:00 | ||
Design Patterns | 00:00:00 | ||
Other Concepts | 00:00:00 | ||
3.0 Lesson: Implementing Ppo | |||
Implementing PPO | 00:00:00 | ||
Implementation Considerations | 00:00:00 | ||
Implementation Steps | 00:00:00 | ||
Establish High-Level Objectives | 00:00:00 | ||
Assess Current Capabilities | 00:00:00 | ||
Determine Measurable Targets | 00:00:00 | ||
Implement Process Improvement | 00:00:00 | ||
Implement Measurement Framework | 00:00:00 | ||
Review & Improve | 00:00:00 | ||
Challenges, Risks & CSFs | 00:00:00 | ||
Challenges | 00:00:00 | ||
Risks | 00:00:00 | ||
CSFs | 00:00:00 | ||
4.0 Lesson: Organization & Implement Summary | |||
Organization & Implement Summary Intro | 00:00:00 | ||
Organizing & Implement Summary | 00:00:00 | ||
Checkpoint | 00:00:00 | ||
Chapter 04 Review | 00:00:00 | ||
Course Closure | 00:00:00 |
Course Reviews
No Reviews found for this course.