ITIL Planning, Protection & Optimsation (PPO)

ITIL Planning, Protection & Optimsation (PPO) From GRCLearning

Delegates attending this course will gain a comprehensive understanding of ITIL Service Management as it applies to the Planning, Protection & Optimisation processes, aligned to the current version, ITIL: 2011.
The purpose of the ITIL Intermediate certificate in Planning, Protection & Optimisation is to certify that the delegate has gained a thorough and detailed knowledge of the PPO processes, the structure and advanced concepts, and has comprehended the essential principles of ITIL based PPO practices for Service Management.
This course is delivered in partnership with Syygal, a globally Accredited Training Organisation and Accredited Courseware Provider for the ITIL education & certification program.
WHATS INCLUDED
This e-Learning course has been designed by industry professionals and delivered by seasoned trainers. Based on Syzygals own TACT methodology this e-Learning course brings together theoretical learning with interactive activities that are focused on your memory retention, within this course you will have:
8 x engaging e-Learning chapter modules
Practice quiz question at the end of each module
Exercises to help knowledge retention, at the end of each module
A virtual mentor
Full online practice exams, with full rationales
COURSE CONTENT
The course ensures a thorough understanding of associated activities, roles, responsibilities, challenges, risks and critical success factors
Service Management as a practice and how it creates business value In-depth review of the key processes, and their associated activities and functions Capacity Management: Ensuring cost justifiable IT capacity always exists and is matched to the needs of the business Availability Management: Ensuring the level of service availability is matched to, or exceeds, the needs of the business IT Service Continuity Management: Supporting the overall Business Continuity Management process, ensuring that required IT technical and service facilities can be resumed within agreed timescales
Information Security Management: Part of the overall corporate governance framework this process ensures that IT and business security are aligned
Demand Management: Identifying patterns of business activity to enable the appropriate strategy to be implemented How the Risk Management processes works in the context of these processes
REQUIREMENTS
This course will take an estimated 12 hours to complete
Our e-learning modules run in a web browser and should work across most platforms. As a guideline the following specifications should be highlighted:
Windows 2000, XP Vista or Windows 8, or Mac OS X (or later)
Windows Pentium 2 processor or better (Pentium 3 recommended), or Macintosh G3 or higher
256 megabytes (MB) RAM or more (512 recommended)
800×600 screen resolution (1024×768 recommended)
An Internet connection
A web browser (see below)
We recommend using a latest browser, following are the minimum browser requirements for use with this e-Learning:
Windows: Internet Explorer 9+, Firefox, Chrome
Mac OS 10.3 and later: Firefox, Chrome