
COURSE OVERVIEW
The course offers candidates awareness of the key elements, concepts and terminology used in the ITIL Service Lifecycle, including the linkages between Lifecycle stages, the processes used and their contribution to Service Management practices.
AIMS
This qualification is primarily aimed towards:
• Those who require a working knowledge of the ITIL framework;
• Those who need understanding of how ITIL can be used to enhance the security and quality of IT service management within an organization;
• IT professionals or others working within an organization that has adopted and adapted ITIL who need to be informed about, or contribute to an ongoing service improvement programme.

ITIL COURSE MODULES
SERVICE MANAGEMET & THE ITIL SERVICE LIFECYCLE
Specifically, candidates must be able to define and explain the following key concepts:
• Utility and warranty , Assets, resources and capabilities
• Service portfolio , Governance , Risk management
• Service design package , Security Management, Availability
SERVICE STRATEGY
Delivering a comprehensive and clear service provision model, in which we identify how the services will be funded and presented, and to whom they will be delivered and the purpose that they will serve.
Coordinating and documenting the use of service assets for the provision of services, and how they can be used, including optimizing their performance.
The service strategy publication provides guidance on understanding the most important practices that need to be employed to define and carry out a service strategy in a service provider organization.
Service level management (SLM). Service-based SLA & SLA monitoring (SLAM) chart
SERVICE DESIGN
We examine what we call the 4 P’s - People, Processes, Products and Partners – the 4 areas we need to consider when designing a service. We then look at the 5 major aspects of Service Design. These are:
• Designing the Service Solution itself
• Designing the service management system and tools that will be required to manage the service
• Understanding the importance of management and technology architectures
• Understanding the processes that will be required
• The measurement systems, methods and metrics that will show us whether the service is working properly
SERVICE TRANSITION
• Transition planning and support
• Service Asset and Configuration Management (SACM)
• Release and Deployment Management
SERVICE OPERATION
We examine the four functions involved in service operations. These are the service desk, technical management, application management and operations management functions.
CONTINUAL SERVICE IMPROVEMENT
• What value continual service improvement provides to the business
• Understand the purpose, objectives and scope for the seven-step improvement process
• Explain the continual service improvement approach
• Describe the CSI register and the Deming Cycle Understand the role of measurement for continual service improvement and types of metrics
• Understand the relationship between critical success factors and key performance indicators and the importance of Baselines

COURSE ORGANISATION & TIMING
This course is aimed at corporate users (IT Departments) and is run only upon prior approval from the authorities.
The course is modular and candidates can take any combination from P1 and then A1- A4. Courses are hands-on(25% theory, 75% practice)
- Monday - Friday (Between 10am - 5pm)
- Course Materials and Online Content Provided
- Duration is indicative and may include off-campus assignments and exams questions
- Flexible Timetable
- Special Packages + Payment Facilities
BENEFITS OF THIS COURSE
There are many benefits in ITIL

RELATED COURSES - ARTICLES

Ethics for IT Professionals
Embarking on a cybersecurity career requires structured learning and certifications. At INFOCLUB Training Centre, we have a plan to make you become a top-level professional in Cybersecurity. Read below a detailed 18-24 month roadmap, highlighting certifications, skills acquired, exam structures, and potential job roles at each stage.

Building a Career in Cybersecurity
Embarking on a cybersecurity career requires structured learning and certifications. At INFOCLUB Training Centre, we have a plan to make you become a top-level professional in Cybersecurity. Read below a detailed 18-24 month roadmap, highlighting certifications, skills acquired, exam structures, and potential job roles at each stage.

Why IT Kids?
Unleash Your Child’s Digital Potential This Summer with Fun, Hands-On IT Courses! As the summer holidays roll around, it’s time to think beyond the textbooks

THE BELBIN MODEL
The Belbin Model, also known as Belbin Team Roles, is a framework for understanding the roles individuals naturally adopt in a team setting. Developed in

Writing a Critical Appraisal
INTRODUCTION How do you write a critical appraisal? Many people find difficulties doing this at the end of their project or dissertation. A critical appraisal

PRIVACY IN THE MODERN WORLD
What is Privacy? It is the right of an individual to keep their personal information and activities from being disclosed to others without their consent. In our article, we shall review the following: What are the top risks to privacy today, What are the technical solutions to protect privacy, The legal aspect and what is GDPR, How privacy varies across cultures, How new technologies could challenge privacy in the future
INTERESTED IN THIS COURSE?
Contact us if you have any questions regarding this course. We are also available after hours for any requests.
- +230 241 1533 (During Office Hours only)
- +230 5941 9678 (If first number is not available)
- infoclubltd@yahoo.com
- infoclubtraining@gmail.com
- administration@infoclub.org
SEND US A MESSAGE