vinsys
Vinsys International
Vinsys IT Services
HomeCorporateIndividualGalleryOur PresenceAbout UsCareerPrivacy PolicyTerms and ConditionsBe An Instructor
{"courseDuratoin":null,"subCategory":"IT Service Management","courseRating":4,"courseSummary":"ITILŪ Intermediate PPO certification training solely focuses on imparting the best possible guidance with respect to the ITILŪ Service Design publication. The mission of the ITILŪ PPO module is to ensure that service management systems, and architecture are designed in such a way that is meets the client\u2019s requirement. The 3-day course enlightens the candidate on the operational-level process activities and supporting methods and approaches to executing these processes in a practical, hands-on learning environment. The ITILŪ Intermediate PPO training permit the professionals to approach a scenario-based learning environment where they get a hands-on approach of the disciplines involved in functioning a task.","pageId":"itil-intermediate-ppo-training","countOfLearner":10000,"ratingCount":2000,"categoryName":"Business And Process Framework Training And Certification","productVideoLink":"https://www.youtube.com/embed/pgYP6ykVmvY","mode":"Online","catID":"it-service-management","courseName":"ITILŪ Intermediate PPO Certification Training","courseImage":"itil.png","common":true,"courseImagePath":"images/","countryCode":"ALL","averageRating":3.8,"courseStartsOn":"","pageURL":"/it-service-management/itil-intermediate-ppo-training","id":null,"batchType":"WeekEnd","isFavourite":null}
IT Service Management
4
ITILŪ Intermediate PPO certification training solely focuses on imparting the best possible guidance with respect to the ITILŪ Service Design publication. The mission of the ITILŪ PPO module is to ensure that service management systems, and architecture are designed in such a way that is meets the client?s requirement. The 3-day course enlightens the candidate on the operational-level process activities and supporting methods and approaches to executing these processes in a practical, hands-on learning environment. The ITILŪ Intermediate PPO training permit the professionals to approach a scenario-based learning environment where they get a hands-on approach of the disciplines involved in functioning a task.
itil-intermediate-ppo-training
10000
2000
Business And Process Framework Training And Certification
Online
it-service-management

ITILŪ Intermediate PPO Certification Training

ITILŪ Intermediate PPO Certification Training

itil.png
true
images/
ALL
3.8
WeekEnd
[{"reviewUser":{"firstName":"Mr.Binoy","lastName":"Mathews","userImage":"/reviewer.png","userImagePath":"/images","middleName":"","userId":1},"description":"The ITILŪ Intermediate PPO training was perfectly tailored to suit my needs as it helped me gain in-depth understanding of Service Design processes. This in turn ensured new services, tools, technology architecture, service management systems and metrics are designed to meet both user and enterprise needs.","course":"ITILŪ","id":null,"ratingCount":5,"title":"IT Manager"},{"reviewUser":{"firstName":"Mr.Shimith","lastName":"Jayanand","userImage":"/reviewer.png","userImagePath":"/images","middleName":"","userId":1},"description":"The ITILŪ Intermediate PPO training was perfectly tailored to suit my needs as it helped me gain in-depth understanding of Service Design processes. This in turn ensured new services, tools, technology architecture, service management systems and metrics are designed to meet both user and enterprise needs.","course":"ITILŪ","id":null,"ratingCount":4,"title":"IT Leader"},{"reviewUser":{"firstName":"Mr.Shashikant","lastName":"Yadav","userImage":"/reviewer.png","userImagePath":"/images","middleName":"","userId":1},"description":"Giving the ITILŪ PPO exam successfully helped me as a professional who wanted to focus on gaining specialized knowledge in PPO and apply them in day-to-day IT Service Management activities. I am thankful to Vinsys that I am now able to do so.","course":"ITILŪ","id":null,"ratingCount":3,"title":"Senior Engineer"}]
{"reviewUser":{"firstName":"Mr.Binoy","lastName":"Mathews","userImage":"/reviewer.png","userImagePath":"/images","middleName":"","userId":1},"description":"The ITILŪ Intermediate PPO training was perfectly tailored to suit my needs as it helped me gain in-depth understanding of Service Design processes. This in turn ensured new services, tools, technology architecture, service management systems and metrics are designed to meet both user and enterprise needs.","course":"ITILŪ","id":null,"ratingCount":5,"title":"IT Manager"}
{"firstName":"Mr.Binoy","lastName":"Mathews","userImage":"/reviewer.png","userImagePath":"/images","middleName":"","userId":1}
Mr.Binoy
Mathews
/reviewer.png
/images
1
The ITILŪ Intermediate PPO training was perfectly tailored to suit my needs as it helped me gain in-depth understanding of Service Design processes. This in turn ensured new services, tools, technology architecture, service management systems and metrics are designed to meet both user and enterprise needs.
ITILŪ
5
IT Manager
{"reviewUser":{"firstName":"Mr.Shimith","lastName":"Jayanand","userImage":"/reviewer.png","userImagePath":"/images","middleName":"","userId":1},"description":"The ITILŪ Intermediate PPO training was perfectly tailored to suit my needs as it helped me gain in-depth understanding of Service Design processes. This in turn ensured new services, tools, technology architecture, service management systems and metrics are designed to meet both user and enterprise needs.","course":"ITILŪ","id":null,"ratingCount":4,"title":"IT Leader"}
{"firstName":"Mr.Shimith","lastName":"Jayanand","userImage":"/reviewer.png","userImagePath":"/images","middleName":"","userId":1}
Mr.Shimith
Jayanand
/reviewer.png
/images
1
The ITILŪ Intermediate PPO training was perfectly tailored to suit my needs as it helped me gain in-depth understanding of Service Design processes. This in turn ensured new services, tools, technology architecture, service management systems and metrics are designed to meet both user and enterprise needs.
ITILŪ
4
IT Leader
{"reviewUser":{"firstName":"Mr.Shashikant","lastName":"Yadav","userImage":"/reviewer.png","userImagePath":"/images","middleName":"","userId":1},"description":"Giving the ITILŪ PPO exam successfully helped me as a professional who wanted to focus on gaining specialized knowledge in PPO and apply them in day-to-day IT Service Management activities. I am thankful to Vinsys that I am now able to do so.","course":"ITILŪ","id":null,"ratingCount":3,"title":"Senior Engineer"}
{"firstName":"Mr.Shashikant","lastName":"Yadav","userImage":"/reviewer.png","userImagePath":"/images","middleName":"","userId":1}
Mr.Shashikant
Yadav
/reviewer.png
/images
1
Giving the ITILŪ PPO exam successfully helped me as a professional who wanted to focus on gaining specialized knowledge in PPO and apply them in day-to-day IT Service Management activities. I am thankful to Vinsys that I am now able to do so.
ITILŪ
3
Senior Engineer
0
[{"tabName":"What will you learn?","tabNumber":1,"content":{"ParamDetails":{"features":[{"heading":"Learning Objectives -","_id":1,"listContent":[{"feature":"Understanding Service Management as a Practice and how the processes within Planning Protection and Optimization support the Service Lifecycle","_id":1},{"feature":"Knowing the important role of Planning Protection and Optimization in service provision and understanding of how the in-scope processes interact with other Service Lifecycle processes","_id":2},{"feature":"The activities, methods and functions used in each of the Planning Protection and Optimization processes","_id":3},{"feature":"The application of Planning Protection and Optimization processes, activities and functions to achieve operational excellence","_id":4},{"feature":"How to measure Planning Protection and Optimization performance","_id":4},{"feature":"The importance of IT Security and how it supports Planning Protection and Optimization","_id":4},{"feature":"Understanding technology and implementation requirements in support of Planning Protection and Optimization","_id":4},{"feature":"The challenges, critical success factors and risks related with Planning Protection and Optimization","_id":4}]}],"description":null,"_id":2},"_id":2}},{"tabName":"Course Objectives","tabNumber":2,"content":{"ParamDetails":{"features":[{"heading":null,"_id":1,"listContent":[{"feature":"Imbibing service management as a core component for practice along with understanding the process through the planning, protection and optimization of service lifecycle through the ITILŪ PPO module ","_id":1},{"feature":"Expressing the role of Planning Protection and Optimization through ITILŪ PPO certification exam for providing service and how the interaction of in-scope processes and Service Lifecycle processes is acquired ","_id":1},{"feature":"Explaining activities methods and functions of ITILŪ PPO used in each of the Planning Protection and Optimization processes ","_id":1},{"feature":"Measuring Planning Protection and Optimization performance through ITILŪ Intermediate PPO course ","_id":1},{"feature":"The importance of IT Security and how it supports Planning Protection and Optimization ","_id":1},{"feature":"Utilizing technology and its implementation in requirement for supporting of Planning Protection and Optimization that is delivered through ITILŪ PPO certification exam ","_id":1}]}],"description":null,"_id":2},"_id":2}},{"tabName":"Audience","tabNumber":3,"content":{"ParamDetails":{"features":[{"heading":"","_id":1,"listContent":[{"feature":"Individuals who have their ITILŪ Foundation Certificate (or the ITILŪ v2 Foundation + v3 Foundation Bridge certificate) who want to purse the intermediate and advanced level ITILŪ certifications.","_id":1},{"feature":"Individuals who require a deeper understanding of the Planning Protection and Optimization processes and how these may be used and how these may be used to enhance the quality of IT service support within an organization, for example: operational staff involved in Capacity Management, Availability Management, IT Service Continuity Management, Information security Management, Demand Management and Risk Management.","_id":2},{"feature":"IT professionals involved in IT Service Management implementation and improvement programs","_id":3},{"feature":"A typical role includes (but is not restricted to): IT professionals, IT/business managers and IT/business process owners and IT practitioners","_id":4}]}],"description":"The Planning Protection and Optimization Capability course will be of interest to:","_id":2},"_id":2}},{"tabName":"Prerequisites ","tabNumber":4,"content":{"ParamDetails":{"features":[{"heading":"","_id":1,"listContent":[{"feature":"Hold an ITILŪ Foundation Certificate or ITILŪ v2 Foundation + v3 Foundation Bridge Certificate","_id":1},{"feature":"There is no minimum mandatory requirement but 2 to 4 years professional experience working in IT Service Management is highly desirable","_id":2},{"feature":"It is also strongly recommended that candidates:","_id":3},{"feature":"Can demonstrate familiarity with IT terminology and understand the context of Planning Protection and Optimization management of their own business environment is strongly recommended","_id":4},{"feature":"Have exposure working in the service management capacity within a service provider environment, with responsibility emphasizing on at least one of the following management processes","_id":3},{"feature":"Capacity Management, Availability Management, IT Service Continuity Management (ITSCM), Information Security Management and Demand Management","_id":4},{"feature":"It is recommended that candidates are familiar with the guidance detailed in the ITILŪ Service Lifecycle Practices core publications prior to attending training for this certification, in particular the Service Design publication.","_id":4}]}],"description":"Candidates for this course must:","_id":2},"_id":2}},{"tabName":"Course Outline","tabNumber":5,"content":{"ParamDetails":{"features":[{"heading":"Introduction and Overview","_id":3,"listContent":[{"feature":"Planning, Protection and Optimization in the context of the Service Lifecycle","_id":14},{"feature":"The Service value proposition","_id":15},{"feature":"Role of processes in Service Management","_id":16},{"feature":"How Service Management creates business value Core Planning, Protection and Optimization Processes","_id":17},{"feature":"Capacity Management","_id":16},{"feature":"Conducting capacity management to contribute to quality assurance","_id":17},{"feature":"Purpose, goals and objectives","_id":16},{"feature":"Delivering against Service Level targets","_id":17},{"feature":"Meeting cost and time constraints","_id":16},{"feature":"Activities, methods and techniques","_id":17},{"feature":"Fit-for-purpose and fit-for-use","_id":17}]},{"heading":"Availability Management","_id":3,"listContent":[{"feature":"Contributing to quality for fit-for-purpose and fit-for-use services","_id":14},{"feature":"Scope of the process","_id":15},{"feature":"Enabling Availability Management through activities, methods and techniques","_id":16},{"feature":"How Availability Management creates business value","_id":15},{"feature":"Triggers, input and output to other processes","_id":16},{"feature":"Establishing metrics to ensure process quality","_id":16}]},{"heading":"IT Service Continuity Management (ITSC)","_id":3,"listContent":[{"feature":"Ensuring quality assurance when introducing services through effective ITSC management","_id":14},{"feature":"Illustrating the main activities","_id":15},{"feature":"Managing risks","_id":16},{"feature":"Planning for recovery","_id":16},{"feature":"Policies and principles","_id":16},{"feature":"Challenges and critical success factors","_id":16}]},{"heading":"Information Security Management","_id":3,"listContent":[{"feature":"Analyzing how Information Security Management contributes to quality assurance for new services","_id":14},{"feature":"Aligning IT security with business security","_id":15},{"feature":"Ensuring confidentiality, integrity and availability","_id":16},{"feature":"How Information Security Management generates business value","_id":15},{"feature":"Activities, methods and techniques","_id":16},{"feature":"Key metrics to measure success","_id":15}]},{"heading":"Demand Management","_id":3,"listContent":[{"feature":"Purpose, goals and objectives","_id":14},{"feature":"Influencing customer demand","_id":15},{"feature":"Coupling capacity with demand","_id":16},{"feature":"Activities, methods and techniques","_id":16}]},{"heading":"Risk Management","_id":3,"listContent":[{"feature":"Risks relative to the Planning, Protection and Optimization process management","_id":14},{"feature":"Identifying the challenges, critical success factors and risks related to the other processes","_id":15},{"feature":"The risks directly related with Service Design","_id":15},{"feature":"How risks relate to the practice elements of Planning, Protection and Optimization","_id":15}]},{"heading":"Roles and Responsibilities","_id":3,"listContent":[{"feature":"Capacity management","_id":14},{"feature":"Availability management","_id":15},{"feature":"IT Service Continuity management","_id":16},{"feature":"Information Security management","_id":16}]},{"heading":"Technology and Implementation Considerations","_id":3,"listContent":[{"feature":"Generic requirements and evaluation criteria","_id":14},{"feature":"Special technology functions and features related to Planning, Protection and Optimization","_id":15},{"feature":"Good practices for implementation","_id":16},{"feature":"Determining the evaluation criteria for technology and process implementation","_id":15},{"feature":"Challenges, critical success factors and risks","_id":15},{"feature":"Considerations for planning and implementing Service Management technologies","_id":15}]},{"heading":"Common Service Activities","_id":3,"listContent":[{"feature":"Analyzing operations performed in day-to-day activities","_id":14},{"feature":"The maturity model of technology management","_id":15},{"feature":"Aligning operations with the overall service and process objectives","_id":16},{"feature":"Service monitoring and control","_id":16}]},{"heading":"Continual Service Improvement","_id":3,"listContent":[{"feature":"Implementing an effective CSI program","_id":14},{"feature":"CSI in respect to organizational change","_id":14},{"feature":"Best practice elements of CSI","_id":14},{"feature":"Measuring service performance","_id":14},{"feature":"Cost benefit justification","_id":14}]}],"description":null,"_id":3},"_id":3}},{"tabName":"About the Examination","tabNumber":6,"content":{"ParamDetails":{"features":[{"heading":null,"_id":4,"listContent":[{"feature":"Evidence of ITILŪ Foundation Certificate or ITILŪ v2 Foundation + v3 Foundation Bridge Certificate ","_id":36},{"feature":"It is recommended that students should complete at least 12 hours of personal study by reviewing the syllabus and the associated areas of the ITILŪ Service Management Practice core guidance, in particular Service Strategy, Service Design and Service Transition publications in preparation for the examination.","_id":37},{"feature":"The exam is a closed book exam with eight (8) multiple choice, scenario-based, gradient scored questions","_id":38},{"feature":"Exam duration is a maximum 90 minutes for all candidates (candidates sitting the examination in a language other than their first language have a maximum of 120 minutes and are allowed to use a dictionary)","_id":39},{"feature":"Each question will have 4 possible answer options, one of which worth 5 marks is, one which worth 3 marks is, one which worth 1 mark is, and one which a distracter is and achieves no marks.","_id":40},{"feature":"Pass score is 28/40 or 70%","_id":41}]}],"description":null,"_id":4},"_id":4}},{"tabName":"Course Advisor","tabNumber":7,"content":{"advisiorName":"Ajit Joshi","advisiorDescription":"","imageName":"/ajit-joshi.jpg","imageUrl":"/images","width":"100","disabled":true,"_id":1,"designation":"Associate Vice President and Head \u2013 Governance and Enterprise Transformation in IT Service Management (GeTSM)","achivements":[{"achivement":"8 + years of experience in IT operations, Service Management, Training","_id":1},{"achivement":"Trained more than 1000 + professionals on technology & upselling, and Best Management Practices, like ITILŪ, COBIT, Six Sigma, Prince 2.","_id":2},{"achivement":"ITILŪ Release, Control and Validation Certified.","_id":2},{"achivement":"ITILŪ Service Offering and Agreement Certified.","_id":2},{"achivement":"ITILŪ Planning, Protection and Optimization Certified.","_id":2}],"class":"button","version":"2.0","height":"10"}},{"tabName":"FAQ","tabNumber":8,"content":{"ParamDetails":{"features":[{"heading":"What is ITILŪ PPO Certification?","_id":4,"listContent":[{"feature":"This course provides comprehensive training for anyone involved in provision, support, and delivery of IT Services.","_id":62}]},{"heading":"What is the Eligibility Criteria / Pre-requisites for the ITILŪ PPO Exam?","_id":4,"listContent":[{"feature":"Evidence of ITILŪ Foundation Certificate or ITILŪ v2 Foundation + v3 Foundation Bridge Certificate ","_id":62}]},{"heading":"What is the duration of training?","_id":4,"listContent":[{"feature":"Training duration is 2-3 days.","_id":62}]},{"heading":"Do you provide certificates on successfully completing the course?","_id":4,"listContent":[{"feature":"Yes, at the end of the class, we will execute PeopleCert exams. After passing the exam you will receive soft copy of certificate on your email which states that you have successfully completed the course","_id":62}]},{"heading":"When are the classes conducted?","_id":4,"listContent":[{"feature":"All open house sessions are conducted on weekends only. For in-house sessions, it can be as per the customer requested schedule.","_id":62}]},{"heading":"What all is included in the course?","_id":4,"listContent":[{"feature":"Along with facilitating training sessions, we provide required course material and practice questions for exam preparation","_id":62}]},{"heading":"Who conduct the training sessions?","_id":4,"listContent":[{"feature":"Training sessions are facilitated by certified experts having practical working experience as well as training experience. ","_id":62}]},{"heading":"Why one should join Vinsys?","_id":4,"listContent":[{"feature":"We are Accredited Training Organization ","_id":62},{"feature":"Experiential Education","_id":62},{"feature":"Experienced Industry Experts","_id":62},{"feature":"Accredited course material","_id":62},{"feature":"Quality Courseware","_id":62},{"feature":"Post training support","_id":62}]}],"description":null,"_id":4},"_id":7}}]
{"tabName":"What will you learn?","tabNumber":1,"content":{"ParamDetails":{"features":[{"heading":"Learning Objectives -","_id":1,"listContent":[{"feature":"Understanding Service Management as a Practice and how the processes within Planning Protection and Optimization support the Service Lifecycle","_id":1},{"feature":"Knowing the important role of Planning Protection and Optimization in service provision and understanding of how the in-scope processes interact with other Service Lifecycle processes","_id":2},{"feature":"The activities, methods and functions used in each of the Planning Protection and Optimization processes","_id":3},{"feature":"The application of Planning Protection and Optimization processes, activities and functions to achieve operational excellence","_id":4},{"feature":"How to measure Planning Protection and Optimization performance","_id":4},{"feature":"The importance of IT Security and how it supports Planning Protection and Optimization","_id":4},{"feature":"Understanding technology and implementation requirements in support of Planning Protection and Optimization","_id":4},{"feature":"The challenges, critical success factors and risks related with Planning Protection and Optimization","_id":4}]}],"description":null,"_id":2},"_id":2}}
What will you learn?
1
{"ParamDetails":{"features":[{"heading":"Learning Objectives -","_id":1,"listContent":[{"feature":"Understanding Service Management as a Practice and how the processes within Planning Protection and Optimization support the Service Lifecycle","_id":1},{"feature":"Knowing the important role of Planning Protection and Optimization in service provision and understanding of how the in-scope processes interact with other Service Lifecycle processes","_id":2},{"feature":"The activities, methods and functions used in each of the Planning Protection and Optimization processes","_id":3},{"feature":"The application of Planning Protection and Optimization processes, activities and functions to achieve operational excellence","_id":4},{"feature":"How to measure Planning Protection and Optimization performance","_id":4},{"feature":"The importance of IT Security and how it supports Planning Protection and Optimization","_id":4},{"feature":"Understanding technology and implementation requirements in support of Planning Protection and Optimization","_id":4},{"feature":"The challenges, critical success factors and risks related with Planning Protection and Optimization","_id":4}]}],"description":null,"_id":2},"_id":2}
{"features":[{"heading":"Learning Objectives -","_id":1,"listContent":[{"feature":"Understanding Service Management as a Practice and how the processes within Planning Protection and Optimization support the Service Lifecycle","_id":1},{"feature":"Knowing the important role of Planning Protection and Optimization in service provision and understanding of how the in-scope processes interact with other Service Lifecycle processes","_id":2},{"feature":"The activities, methods and functions used in each of the Planning Protection and Optimization processes","_id":3},{"feature":"The application of Planning Protection and Optimization processes, activities and functions to achieve operational excellence","_id":4},{"feature":"How to measure Planning Protection and Optimization performance","_id":4},{"feature":"The importance of IT Security and how it supports Planning Protection and Optimization","_id":4},{"feature":"Understanding technology and implementation requirements in support of Planning Protection and Optimization","_id":4},{"feature":"The challenges, critical success factors and risks related with Planning Protection and Optimization","_id":4}]}],"description":null,"_id":2}
[{"heading":"Learning Objectives -","_id":1,"listContent":[{"feature":"Understanding Service Management as a Practice and how the processes within Planning Protection and Optimization support the Service Lifecycle","_id":1},{"feature":"Knowing the important role of Planning Protection and Optimization in service provision and understanding of how the in-scope processes interact with other Service Lifecycle processes","_id":2},{"feature":"The activities, methods and functions used in each of the Planning Protection and Optimization processes","_id":3},{"feature":"The application of Planning Protection and Optimization processes, activities and functions to achieve operational excellence","_id":4},{"feature":"How to measure Planning Protection and Optimization performance","_id":4},{"feature":"The importance of IT Security and how it supports Planning Protection and Optimization","_id":4},{"feature":"Understanding technology and implementation requirements in support of Planning Protection and Optimization","_id":4},{"feature":"The challenges, critical success factors and risks related with Planning Protection and Optimization","_id":4}]}]
{"heading":"Learning Objectives -","_id":1,"listContent":[{"feature":"Understanding Service Management as a Practice and how the processes within Planning Protection and Optimization support the Service Lifecycle","_id":1},{"feature":"Knowing the important role of Planning Protection and Optimization in service provision and understanding of how the in-scope processes interact with other Service Lifecycle processes","_id":2},{"feature":"The activities, methods and functions used in each of the Planning Protection and Optimization processes","_id":3},{"feature":"The application of Planning Protection and Optimization processes, activities and functions to achieve operational excellence","_id":4},{"feature":"How to measure Planning Protection and Optimization performance","_id":4},{"feature":"The importance of IT Security and how it supports Planning Protection and Optimization","_id":4},{"feature":"Understanding technology and implementation requirements in support of Planning Protection and Optimization","_id":4},{"feature":"The challenges, critical success factors and risks related with Planning Protection and Optimization","_id":4}]}

Learning Objectives -

1
[{"feature":"Understanding Service Management as a Practice and how the processes within Planning Protection and Optimization support the Service Lifecycle","_id":1},{"feature":"Knowing the important role of Planning Protection and Optimization in service provision and understanding of how the in-scope processes interact with other Service Lifecycle processes","_id":2},{"feature":"The activities, methods and functions used in each of the Planning Protection and Optimization processes","_id":3},{"feature":"The application of Planning Protection and Optimization processes, activities and functions to achieve operational excellence","_id":4},{"feature":"How to measure Planning Protection and Optimization performance","_id":4},{"feature":"The importance of IT Security and how it supports Planning Protection and Optimization","_id":4},{"feature":"Understanding technology and implementation requirements in support of Planning Protection and Optimization","_id":4},{"feature":"The challenges, critical success factors and risks related with Planning Protection and Optimization","_id":4}]
{"feature":"Understanding Service Management as a Practice and how the processes within Planning Protection and Optimization support the Service Lifecycle","_id":1}
Understanding Service Management as a Practice and how the processes within Planning Protection and Optimization support the Service Lifecycle
1
{"feature":"Knowing the important role of Planning Protection and Optimization in service provision and understanding of how the in-scope processes interact with other Service Lifecycle processes","_id":2}
Knowing the important role of Planning Protection and Optimization in service provision and understanding of how the in-scope processes interact with other Service Lifecycle processes
2
{"feature":"The activities, methods and functions used in each of the Planning Protection and Optimization processes","_id":3}
The activities, methods and functions used in each of the Planning Protection and Optimization processes
3
{"feature":"The application of Planning Protection and Optimization processes, activities and functions to achieve operational excellence","_id":4}
The application of Planning Protection and Optimization processes, activities and functions to achieve operational excellence
4
{"feature":"How to measure Planning Protection and Optimization performance","_id":4}
How to measure Planning Protection and Optimization performance
4
{"feature":"The importance of IT Security and how it supports Planning Protection and Optimization","_id":4}
The importance of IT Security and how it supports Planning Protection and Optimization
4
{"feature":"Understanding technology and implementation requirements in support of Planning Protection and Optimization","_id":4}
Understanding technology and implementation requirements in support of Planning Protection and Optimization
4
{"feature":"The challenges, critical success factors and risks related with Planning Protection and Optimization","_id":4}
The challenges, critical success factors and risks related with Planning Protection and Optimization
4
2
2
{"tabName":"Course Objectives","tabNumber":2,"content":{"ParamDetails":{"features":[{"heading":null,"_id":1,"listContent":[{"feature":"Imbibing service management as a core component for practice along with understanding the process through the planning, protection and optimization of service lifecycle through the ITILŪ PPO module ","_id":1},{"feature":"Expressing the role of Planning Protection and Optimization through ITILŪ PPO certification exam for providing service and how the interaction of in-scope processes and Service Lifecycle processes is acquired ","_id":1},{"feature":"Explaining activities methods and functions of ITILŪ PPO used in each of the Planning Protection and Optimization processes ","_id":1},{"feature":"Measuring Planning Protection and Optimization performance through ITILŪ Intermediate PPO course ","_id":1},{"feature":"The importance of IT Security and how it supports Planning Protection and Optimization ","_id":1},{"feature":"Utilizing technology and its implementation in requirement for supporting of Planning Protection and Optimization that is delivered through ITILŪ PPO certification exam ","_id":1}]}],"description":null,"_id":2},"_id":2}}
Course Objectives
2
{"ParamDetails":{"features":[{"heading":null,"_id":1,"listContent":[{"feature":"Imbibing service management as a core component for practice along with understanding the process through the planning, protection and optimization of service lifecycle through the ITILŪ PPO module ","_id":1},{"feature":"Expressing the role of Planning Protection and Optimization through ITILŪ PPO certification exam for providing service and how the interaction of in-scope processes and Service Lifecycle processes is acquired ","_id":1},{"feature":"Explaining activities methods and functions of ITILŪ PPO used in each of the Planning Protection and Optimization processes ","_id":1},{"feature":"Measuring Planning Protection and Optimization performance through ITILŪ Intermediate PPO course ","_id":1},{"feature":"The importance of IT Security and how it supports Planning Protection and Optimization ","_id":1},{"feature":"Utilizing technology and its implementation in requirement for supporting of Planning Protection and Optimization that is delivered through ITILŪ PPO certification exam ","_id":1}]}],"description":null,"_id":2},"_id":2}
{"features":[{"heading":null,"_id":1,"listContent":[{"feature":"Imbibing service management as a core component for practice along with understanding the process through the planning, protection and optimization of service lifecycle through the ITILŪ PPO module ","_id":1},{"feature":"Expressing the role of Planning Protection and Optimization through ITILŪ PPO certification exam for providing service and how the interaction of in-scope processes and Service Lifecycle processes is acquired ","_id":1},{"feature":"Explaining activities methods and functions of ITILŪ PPO used in each of the Planning Protection and Optimization processes ","_id":1},{"feature":"Measuring Planning Protection and Optimization performance through ITILŪ Intermediate PPO course ","_id":1},{"feature":"The importance of IT Security and how it supports Planning Protection and Optimization ","_id":1},{"feature":"Utilizing technology and its implementation in requirement for supporting of Planning Protection and Optimization that is delivered through ITILŪ PPO certification exam ","_id":1}]}],"description":null,"_id":2}
[{"heading":null,"_id":1,"listContent":[{"feature":"Imbibing service management as a core component for practice along with understanding the process through the planning, protection and optimization of service lifecycle through the ITILŪ PPO module ","_id":1},{"feature":"Expressing the role of Planning Protection and Optimization through ITILŪ PPO certification exam for providing service and how the interaction of in-scope processes and Service Lifecycle processes is acquired ","_id":1},{"feature":"Explaining activities methods and functions of ITILŪ PPO used in each of the Planning Protection and Optimization processes ","_id":1},{"feature":"Measuring Planning Protection and Optimization performance through ITILŪ Intermediate PPO course ","_id":1},{"feature":"The importance of IT Security and how it supports Planning Protection and Optimization ","_id":1},{"feature":"Utilizing technology and its implementation in requirement for supporting of Planning Protection and Optimization that is delivered through ITILŪ PPO certification exam ","_id":1}]}]
{"heading":null,"_id":1,"listContent":[{"feature":"Imbibing service management as a core component for practice along with understanding the process through the planning, protection and optimization of service lifecycle through the ITILŪ PPO module ","_id":1},{"feature":"Expressing the role of Planning Protection and Optimization through ITILŪ PPO certification exam for providing service and how the interaction of in-scope processes and Service Lifecycle processes is acquired ","_id":1},{"feature":"Explaining activities methods and functions of ITILŪ PPO used in each of the Planning Protection and Optimization processes ","_id":1},{"feature":"Measuring Planning Protection and Optimization performance through ITILŪ Intermediate PPO course ","_id":1},{"feature":"The importance of IT Security and how it supports Planning Protection and Optimization ","_id":1},{"feature":"Utilizing technology and its implementation in requirement for supporting of Planning Protection and Optimization that is delivered through ITILŪ PPO certification exam ","_id":1}]}
1
[{"feature":"Imbibing service management as a core component for practice along with understanding the process through the planning, protection and optimization of service lifecycle through the ITILŪ PPO module ","_id":1},{"feature":"Expressing the role of Planning Protection and Optimization through ITILŪ PPO certification exam for providing service and how the interaction of in-scope processes and Service Lifecycle processes is acquired ","_id":1},{"feature":"Explaining activities methods and functions of ITILŪ PPO used in each of the Planning Protection and Optimization processes ","_id":1},{"feature":"Measuring Planning Protection and Optimization performance through ITILŪ Intermediate PPO course ","_id":1},{"feature":"The importance of IT Security and how it supports Planning Protection and Optimization ","_id":1},{"feature":"Utilizing technology and its implementation in requirement for supporting of Planning Protection and Optimization that is delivered through ITILŪ PPO certification exam ","_id":1}]
{"feature":"Imbibing service management as a core component for practice along with understanding the process through the planning, protection and optimization of service lifecycle through the ITILŪ PPO module ","_id":1}
Imbibing service management as a core component for practice along with understanding the process through the planning, protection and optimization of service lifecycle through the ITILŪ PPO module
1
{"feature":"Expressing the role of Planning Protection and Optimization through ITILŪ PPO certification exam for providing service and how the interaction of in-scope processes and Service Lifecycle processes is acquired ","_id":1}
Expressing the role of Planning Protection and Optimization through ITILŪ PPO certification exam for providing service and how the interaction of in-scope processes and Service Lifecycle processes is acquired
1
{"feature":"Explaining activities methods and functions of ITILŪ PPO used in each of the Planning Protection and Optimization processes ","_id":1}
Explaining activities methods and functions of ITILŪ PPO used in each of the Planning Protection and Optimization processes
1
{"feature":"Measuring Planning Protection and Optimization performance through ITILŪ Intermediate PPO course ","_id":1}
Measuring Planning Protection and Optimization performance through ITILŪ Intermediate PPO course
1
{"feature":"The importance of IT Security and how it supports Planning Protection and Optimization ","_id":1}
The importance of IT Security and how it supports Planning Protection and Optimization
1
{"feature":"Utilizing technology and its implementation in requirement for supporting of Planning Protection and Optimization that is delivered through ITILŪ PPO certification exam ","_id":1}
Utilizing technology and its implementation in requirement for supporting of Planning Protection and Optimization that is delivered through ITILŪ PPO certification exam
1
2
2
{"tabName":"Audience","tabNumber":3,"content":{"ParamDetails":{"features":[{"heading":"","_id":1,"listContent":[{"feature":"Individuals who have their ITILŪ Foundation Certificate (or the ITILŪ v2 Foundation + v3 Foundation Bridge certificate) who want to purse the intermediate and advanced level ITILŪ certifications.","_id":1},{"feature":"Individuals who require a deeper understanding of the Planning Protection and Optimization processes and how these may be used and how these may be used to enhance the quality of IT service support within an organization, for example: operational staff involved in Capacity Management, Availability Management, IT Service Continuity Management, Information security Management, Demand Management and Risk Management.","_id":2},{"feature":"IT professionals involved in IT Service Management implementation and improvement programs","_id":3},{"feature":"A typical role includes (but is not restricted to): IT professionals, IT/business managers and IT/business process owners and IT practitioners","_id":4}]}],"description":"The Planning Protection and Optimization Capability course will be of interest to:","_id":2},"_id":2}}
Audience
3
{"ParamDetails":{"features":[{"heading":"","_id":1,"listContent":[{"feature":"Individuals who have their ITILŪ Foundation Certificate (or the ITILŪ v2 Foundation + v3 Foundation Bridge certificate) who want to purse the intermediate and advanced level ITILŪ certifications.","_id":1},{"feature":"Individuals who require a deeper understanding of the Planning Protection and Optimization processes and how these may be used and how these may be used to enhance the quality of IT service support within an organization, for example: operational staff involved in Capacity Management, Availability Management, IT Service Continuity Management, Information security Management, Demand Management and Risk Management.","_id":2},{"feature":"IT professionals involved in IT Service Management implementation and improvement programs","_id":3},{"feature":"A typical role includes (but is not restricted to): IT professionals, IT/business managers and IT/business process owners and IT practitioners","_id":4}]}],"description":"The Planning Protection and Optimization Capability course will be of interest to:","_id":2},"_id":2}
{"features":[{"heading":"","_id":1,"listContent":[{"feature":"Individuals who have their ITILŪ Foundation Certificate (or the ITILŪ v2 Foundation + v3 Foundation Bridge certificate) who want to purse the intermediate and advanced level ITILŪ certifications.","_id":1},{"feature":"Individuals who require a deeper understanding of the Planning Protection and Optimization processes and how these may be used and how these may be used to enhance the quality of IT service support within an organization, for example: operational staff involved in Capacity Management, Availability Management, IT Service Continuity Management, Information security Management, Demand Management and Risk Management.","_id":2},{"feature":"IT professionals involved in IT Service Management implementation and improvement programs","_id":3},{"feature":"A typical role includes (but is not restricted to): IT professionals, IT/business managers and IT/business process owners and IT practitioners","_id":4}]}],"description":"The Planning Protection and Optimization Capability course will be of interest to:","_id":2}
[{"heading":"","_id":1,"listContent":[{"feature":"Individuals who have their ITILŪ Foundation Certificate (or the ITILŪ v2 Foundation + v3 Foundation Bridge certificate) who want to purse the intermediate and advanced level ITILŪ certifications.","_id":1},{"feature":"Individuals who require a deeper understanding of the Planning Protection and Optimization processes and how these may be used and how these may be used to enhance the quality of IT service support within an organization, for example: operational staff involved in Capacity Management, Availability Management, IT Service Continuity Management, Information security Management, Demand Management and Risk Management.","_id":2},{"feature":"IT professionals involved in IT Service Management implementation and improvement programs","_id":3},{"feature":"A typical role includes (but is not restricted to): IT professionals, IT/business managers and IT/business process owners and IT practitioners","_id":4}]}]
{"heading":"","_id":1,"listContent":[{"feature":"Individuals who have their ITILŪ Foundation Certificate (or the ITILŪ v2 Foundation + v3 Foundation Bridge certificate) who want to purse the intermediate and advanced level ITILŪ certifications.","_id":1},{"feature":"Individuals who require a deeper understanding of the Planning Protection and Optimization processes and how these may be used and how these may be used to enhance the quality of IT service support within an organization, for example: operational staff involved in Capacity Management, Availability Management, IT Service Continuity Management, Information security Management, Demand Management and Risk Management.","_id":2},{"feature":"IT professionals involved in IT Service Management implementation and improvement programs","_id":3},{"feature":"A typical role includes (but is not restricted to): IT professionals, IT/business managers and IT/business process owners and IT practitioners","_id":4}]}

1
[{"feature":"Individuals who have their ITILŪ Foundation Certificate (or the ITILŪ v2 Foundation + v3 Foundation Bridge certificate) who want to purse the intermediate and advanced level ITILŪ certifications.","_id":1},{"feature":"Individuals who require a deeper understanding of the Planning Protection and Optimization processes and how these may be used and how these may be used to enhance the quality of IT service support within an organization, for example: operational staff involved in Capacity Management, Availability Management, IT Service Continuity Management, Information security Management, Demand Management and Risk Management.","_id":2},{"feature":"IT professionals involved in IT Service Management implementation and improvement programs","_id":3},{"feature":"A typical role includes (but is not restricted to): IT professionals, IT/business managers and IT/business process owners and IT practitioners","_id":4}]
{"feature":"Individuals who have their ITILŪ Foundation Certificate (or the ITILŪ v2 Foundation + v3 Foundation Bridge certificate) who want to purse the intermediate and advanced level ITILŪ certifications.","_id":1}
Individuals who have their ITILŪ Foundation Certificate (or the ITILŪ v2 Foundation + v3 Foundation Bridge certificate) who want to purse the intermediate and advanced level ITILŪ certifications.
1
{"feature":"Individuals who require a deeper understanding of the Planning Protection and Optimization processes and how these may be used and how these may be used to enhance the quality of IT service support within an organization, for example: operational staff involved in Capacity Management, Availability Management, IT Service Continuity Management, Information security Management, Demand Management and Risk Management.","_id":2}
Individuals who require a deeper understanding of the Planning Protection and Optimization processes and how these may be used and how these may be used to enhance the quality of IT service support within an organization, for example: operational staff involved in Capacity Management, Availability Management, IT Service Continuity Management, Information security Management, Demand Management and Risk Management.
2
{"feature":"IT professionals involved in IT Service Management implementation and improvement programs","_id":3}
IT professionals involved in IT Service Management implementation and improvement programs
3
{"feature":"A typical role includes (but is not restricted to): IT professionals, IT/business managers and IT/business process owners and IT practitioners","_id":4}
A typical role includes (but is not restricted to): IT professionals, IT/business managers and IT/business process owners and IT practitioners
4
The Planning Protection and Optimization Capability course will be of interest to:
2
2
{"tabName":"Prerequisites ","tabNumber":4,"content":{"ParamDetails":{"features":[{"heading":"","_id":1,"listContent":[{"feature":"Hold an ITILŪ Foundation Certificate or ITILŪ v2 Foundation + v3 Foundation Bridge Certificate","_id":1},{"feature":"There is no minimum mandatory requirement but 2 to 4 years professional experience working in IT Service Management is highly desirable","_id":2},{"feature":"It is also strongly recommended that candidates:","_id":3},{"feature":"Can demonstrate familiarity with IT terminology and understand the context of Planning Protection and Optimization management of their own business environment is strongly recommended","_id":4},{"feature":"Have exposure working in the service management capacity within a service provider environment, with responsibility emphasizing on at least one of the following management processes","_id":3},{"feature":"Capacity Management, Availability Management, IT Service Continuity Management (ITSCM), Information Security Management and Demand Management","_id":4},{"feature":"It is recommended that candidates are familiar with the guidance detailed in the ITILŪ Service Lifecycle Practices core publications prior to attending training for this certification, in particular the Service Design publication.","_id":4}]}],"description":"Candidates for this course must:","_id":2},"_id":2}}
Prerequisites
4
{"ParamDetails":{"features":[{"heading":"","_id":1,"listContent":[{"feature":"Hold an ITILŪ Foundation Certificate or ITILŪ v2 Foundation + v3 Foundation Bridge Certificate","_id":1},{"feature":"There is no minimum mandatory requirement but 2 to 4 years professional experience working in IT Service Management is highly desirable","_id":2},{"feature":"It is also strongly recommended that candidates:","_id":3},{"feature":"Can demonstrate familiarity with IT terminology and understand the context of Planning Protection and Optimization management of their own business environment is strongly recommended","_id":4},{"feature":"Have exposure working in the service management capacity within a service provider environment, with responsibility emphasizing on at least one of the following management processes","_id":3},{"feature":"Capacity Management, Availability Management, IT Service Continuity Management (ITSCM), Information Security Management and Demand Management","_id":4},{"feature":"It is recommended that candidates are familiar with the guidance detailed in the ITILŪ Service Lifecycle Practices core publications prior to attending training for this certification, in particular the Service Design publication.","_id":4}]}],"description":"Candidates for this course must:","_id":2},"_id":2}
{"features":[{"heading":"","_id":1,"listContent":[{"feature":"Hold an ITILŪ Foundation Certificate or ITILŪ v2 Foundation + v3 Foundation Bridge Certificate","_id":1},{"feature":"There is no minimum mandatory requirement but 2 to 4 years professional experience working in IT Service Management is highly desirable","_id":2},{"feature":"It is also strongly recommended that candidates:","_id":3},{"feature":"Can demonstrate familiarity with IT terminology and understand the context of Planning Protection and Optimization management of their own business environment is strongly recommended","_id":4},{"feature":"Have exposure working in the service management capacity within a service provider environment, with responsibility emphasizing on at least one of the following management processes","_id":3},{"feature":"Capacity Management, Availability Management, IT Service Continuity Management (ITSCM), Information Security Management and Demand Management","_id":4},{"feature":"It is recommended that candidates are familiar with the guidance detailed in the ITILŪ Service Lifecycle Practices core publications prior to attending training for this certification, in particular the Service Design publication.","_id":4}]}],"description":"Candidates for this course must:","_id":2}
[{"heading":"","_id":1,"listContent":[{"feature":"Hold an ITILŪ Foundation Certificate or ITILŪ v2 Foundation + v3 Foundation Bridge Certificate","_id":1},{"feature":"There is no minimum mandatory requirement but 2 to 4 years professional experience working in IT Service Management is highly desirable","_id":2},{"feature":"It is also strongly recommended that candidates:","_id":3},{"feature":"Can demonstrate familiarity with IT terminology and understand the context of Planning Protection and Optimization management of their own business environment is strongly recommended","_id":4},{"feature":"Have exposure working in the service management capacity within a service provider environment, with responsibility emphasizing on at least one of the following management processes","_id":3},{"feature":"Capacity Management, Availability Management, IT Service Continuity Management (ITSCM), Information Security Management and Demand Management","_id":4},{"feature":"It is recommended that candidates are familiar with the guidance detailed in the ITILŪ Service Lifecycle Practices core publications prior to attending training for this certification, in particular the Service Design publication.","_id":4}]}]
{"heading":"","_id":1,"listContent":[{"feature":"Hold an ITILŪ Foundation Certificate or ITILŪ v2 Foundation + v3 Foundation Bridge Certificate","_id":1},{"feature":"There is no minimum mandatory requirement but 2 to 4 years professional experience working in IT Service Management is highly desirable","_id":2},{"feature":"It is also strongly recommended that candidates:","_id":3},{"feature":"Can demonstrate familiarity with IT terminology and understand the context of Planning Protection and Optimization management of their own business environment is strongly recommended","_id":4},{"feature":"Have exposure working in the service management capacity within a service provider environment, with responsibility emphasizing on at least one of the following management processes","_id":3},{"feature":"Capacity Management, Availability Management, IT Service Continuity Management (ITSCM), Information Security Management and Demand Management","_id":4},{"feature":"It is recommended that candidates are familiar with the guidance detailed in the ITILŪ Service Lifecycle Practices core publications prior to attending training for this certification, in particular the Service Design publication.","_id":4}]}

1
[{"feature":"Hold an ITILŪ Foundation Certificate or ITILŪ v2 Foundation + v3 Foundation Bridge Certificate","_id":1},{"feature":"There is no minimum mandatory requirement but 2 to 4 years professional experience working in IT Service Management is highly desirable","_id":2},{"feature":"It is also strongly recommended that candidates:","_id":3},{"feature":"Can demonstrate familiarity with IT terminology and understand the context of Planning Protection and Optimization management of their own business environment is strongly recommended","_id":4},{"feature":"Have exposure working in the service management capacity within a service provider environment, with responsibility emphasizing on at least one of the following management processes","_id":3},{"feature":"Capacity Management, Availability Management, IT Service Continuity Management (ITSCM), Information Security Management and Demand Management","_id":4},{"feature":"It is recommended that candidates are familiar with the guidance detailed in the ITILŪ Service Lifecycle Practices core publications prior to attending training for this certification, in particular the Service Design publication.","_id":4}]
{"feature":"Hold an ITILŪ Foundation Certificate or ITILŪ v2 Foundation + v3 Foundation Bridge Certificate","_id":1}
Hold an ITILŪ Foundation Certificate or ITILŪ v2 Foundation + v3 Foundation Bridge Certificate
1
{"feature":"There is no minimum mandatory requirement but 2 to 4 years professional experience working in IT Service Management is highly desirable","_id":2}
There is no minimum mandatory requirement but 2 to 4 years professional experience working in IT Service Management is highly desirable
2
{"feature":"It is also strongly recommended that candidates:","_id":3}
It is also strongly recommended that candidates:
3
{"feature":"Can demonstrate familiarity with IT terminology and understand the context of Planning Protection and Optimization management of their own business environment is strongly recommended","_id":4}
Can demonstrate familiarity with IT terminology and understand the context of Planning Protection and Optimization management of their own business environment is strongly recommended
4
{"feature":"Have exposure working in the service management capacity within a service provider environment, with responsibility emphasizing on at least one of the following management processes","_id":3}
Have exposure working in the service management capacity within a service provider environment, with responsibility emphasizing on at least one of the following management processes
3
{"feature":"Capacity Management, Availability Management, IT Service Continuity Management (ITSCM), Information Security Management and Demand Management","_id":4}
Capacity Management, Availability Management, IT Service Continuity Management (ITSCM), Information Security Management and Demand Management
4
{"feature":"It is recommended that candidates are familiar with the guidance detailed in the ITILŪ Service Lifecycle Practices core publications prior to attending training for this certification, in particular the Service Design publication.","_id":4}
It is recommended that candidates are familiar with the guidance detailed in the ITILŪ Service Lifecycle Practices core publications prior to attending training for this certification, in particular the Service Design publication.
4
Candidates for this course must:
2
2
{"tabName":"Course Outline","tabNumber":5,"content":{"ParamDetails":{"features":[{"heading":"Introduction and Overview","_id":3,"listContent":[{"feature":"Planning, Protection and Optimization in the context of the Service Lifecycle","_id":14},{"feature":"The Service value proposition","_id":15},{"feature":"Role of processes in Service Management","_id":16},{"feature":"How Service Management creates business value Core Planning, Protection and Optimization Processes","_id":17},{"feature":"Capacity Management","_id":16},{"feature":"Conducting capacity management to contribute to quality assurance","_id":17},{"feature":"Purpose, goals and objectives","_id":16},{"feature":"Delivering against Service Level targets","_id":17},{"feature":"Meeting cost and time constraints","_id":16},{"feature":"Activities, methods and techniques","_id":17},{"feature":"Fit-for-purpose and fit-for-use","_id":17}]},{"heading":"Availability Management","_id":3,"listContent":[{"feature":"Contributing to quality for fit-for-purpose and fit-for-use services","_id":14},{"feature":"Scope of the process","_id":15},{"feature":"Enabling Availability Management through activities, methods and techniques","_id":16},{"feature":"How Availability Management creates business value","_id":15},{"feature":"Triggers, input and output to other processes","_id":16},{"feature":"Establishing metrics to ensure process quality","_id":16}]},{"heading":"IT Service Continuity Management (ITSC)","_id":3,"listContent":[{"feature":"Ensuring quality assurance when introducing services through effective ITSC management","_id":14},{"feature":"Illustrating the main activities","_id":15},{"feature":"Managing risks","_id":16},{"feature":"Planning for recovery","_id":16},{"feature":"Policies and principles","_id":16},{"feature":"Challenges and critical success factors","_id":16}]},{"heading":"Information Security Management","_id":3,"listContent":[{"feature":"Analyzing how Information Security Management contributes to quality assurance for new services","_id":14},{"feature":"Aligning IT security with business security","_id":15},{"feature":"Ensuring confidentiality, integrity and availability","_id":16},{"feature":"How Information Security Management generates business value","_id":15},{"feature":"Activities, methods and techniques","_id":16},{"feature":"Key metrics to measure success","_id":15}]},{"heading":"Demand Management","_id":3,"listContent":[{"feature":"Purpose, goals and objectives","_id":14},{"feature":"Influencing customer demand","_id":15},{"feature":"Coupling capacity with demand","_id":16},{"feature":"Activities, methods and techniques","_id":16}]},{"heading":"Risk Management","_id":3,"listContent":[{"feature":"Risks relative to the Planning, Protection and Optimization process management","_id":14},{"feature":"Identifying the challenges, critical success factors and risks related to the other processes","_id":15},{"feature":"The risks directly related with Service Design","_id":15},{"feature":"How risks relate to the practice elements of Planning, Protection and Optimization","_id":15}]},{"heading":"Roles and Responsibilities","_id":3,"listContent":[{"feature":"Capacity management","_id":14},{"feature":"Availability management","_id":15},{"feature":"IT Service Continuity management","_id":16},{"feature":"Information Security management","_id":16}]},{"heading":"Technology and Implementation Considerations","_id":3,"listContent":[{"feature":"Generic requirements and evaluation criteria","_id":14},{"feature":"Special technology functions and features related to Planning, Protection and Optimization","_id":15},{"feature":"Good practices for implementation","_id":16},{"feature":"Determining the evaluation criteria for technology and process implementation","_id":15},{"feature":"Challenges, critical success factors and risks","_id":15},{"feature":"Considerations for planning and implementing Service Management technologies","_id":15}]},{"heading":"Common Service Activities","_id":3,"listContent":[{"feature":"Analyzing operations performed in day-to-day activities","_id":14},{"feature":"The maturity model of technology management","_id":15},{"feature":"Aligning operations with the overall service and process objectives","_id":16},{"feature":"Service monitoring and control","_id":16}]},{"heading":"Continual Service Improvement","_id":3,"listContent":[{"feature":"Implementing an effective CSI program","_id":14},{"feature":"CSI in respect to organizational change","_id":14},{"feature":"Best practice elements of CSI","_id":14},{"feature":"Measuring service performance","_id":14},{"feature":"Cost benefit justification","_id":14}]}],"description":null,"_id":3},"_id":3}}
Course Outline
5
{"ParamDetails":{"features":[{"heading":"Introduction and Overview","_id":3,"listContent":[{"feature":"Planning, Protection and Optimization in the context of the Service Lifecycle","_id":14},{"feature":"The Service value proposition","_id":15},{"feature":"Role of processes in Service Management","_id":16},{"feature":"How Service Management creates business value Core Planning, Protection and Optimization Processes","_id":17},{"feature":"Capacity Management","_id":16},{"feature":"Conducting capacity management to contribute to quality assurance","_id":17},{"feature":"Purpose, goals and objectives","_id":16},{"feature":"Delivering against Service Level targets","_id":17},{"feature":"Meeting cost and time constraints","_id":16},{"feature":"Activities, methods and techniques","_id":17},{"feature":"Fit-for-purpose and fit-for-use","_id":17}]},{"heading":"Availability Management","_id":3,"listContent":[{"feature":"Contributing to quality for fit-for-purpose and fit-for-use services","_id":14},{"feature":"Scope of the process","_id":15},{"feature":"Enabling Availability Management through activities, methods and techniques","_id":16},{"feature":"How Availability Management creates business value","_id":15},{"feature":"Triggers, input and output to other processes","_id":16},{"feature":"Establishing metrics to ensure process quality","_id":16}]},{"heading":"IT Service Continuity Management (ITSC)","_id":3,"listContent":[{"feature":"Ensuring quality assurance when introducing services through effective ITSC management","_id":14},{"feature":"Illustrating the main activities","_id":15},{"feature":"Managing risks","_id":16},{"feature":"Planning for recovery","_id":16},{"feature":"Policies and principles","_id":16},{"feature":"Challenges and critical success factors","_id":16}]},{"heading":"Information Security Management","_id":3,"listContent":[{"feature":"Analyzing how Information Security Management contributes to quality assurance for new services","_id":14},{"feature":"Aligning IT security with business security","_id":15},{"feature":"Ensuring confidentiality, integrity and availability","_id":16},{"feature":"How Information Security Management generates business value","_id":15},{"feature":"Activities, methods and techniques","_id":16},{"feature":"Key metrics to measure success","_id":15}]},{"heading":"Demand Management","_id":3,"listContent":[{"feature":"Purpose, goals and objectives","_id":14},{"feature":"Influencing customer demand","_id":15},{"feature":"Coupling capacity with demand","_id":16},{"feature":"Activities, methods and techniques","_id":16}]},{"heading":"Risk Management","_id":3,"listContent":[{"feature":"Risks relative to the Planning, Protection and Optimization process management","_id":14},{"feature":"Identifying the challenges, critical success factors and risks related to the other processes","_id":15},{"feature":"The risks directly related with Service Design","_id":15},{"feature":"How risks relate to the practice elements of Planning, Protection and Optimization","_id":15}]},{"heading":"Roles and Responsibilities","_id":3,"listContent":[{"feature":"Capacity management","_id":14},{"feature":"Availability management","_id":15},{"feature":"IT Service Continuity management","_id":16},{"feature":"Information Security management","_id":16}]},{"heading":"Technology and Implementation Considerations","_id":3,"listContent":[{"feature":"Generic requirements and evaluation criteria","_id":14},{"feature":"Special technology functions and features related to Planning, Protection and Optimization","_id":15},{"feature":"Good practices for implementation","_id":16},{"feature":"Determining the evaluation criteria for technology and process implementation","_id":15},{"feature":"Challenges, critical success factors and risks","_id":15},{"feature":"Considerations for planning and implementing Service Management technologies","_id":15}]},{"heading":"Common Service Activities","_id":3,"listContent":[{"feature":"Analyzing operations performed in day-to-day activities","_id":14},{"feature":"The maturity model of technology management","_id":15},{"feature":"Aligning operations with the overall service and process objectives","_id":16},{"feature":"Service monitoring and control","_id":16}]},{"heading":"Continual Service Improvement","_id":3,"listContent":[{"feature":"Implementing an effective CSI program","_id":14},{"feature":"CSI in respect to organizational change","_id":14},{"feature":"Best practice elements of CSI","_id":14},{"feature":"Measuring service performance","_id":14},{"feature":"Cost benefit justification","_id":14}]}],"description":null,"_id":3},"_id":3}
{"features":[{"heading":"Introduction and Overview","_id":3,"listContent":[{"feature":"Planning, Protection and Optimization in the context of the Service Lifecycle","_id":14},{"feature":"The Service value proposition","_id":15},{"feature":"Role of processes in Service Management","_id":16},{"feature":"How Service Management creates business value Core Planning, Protection and Optimization Processes","_id":17},{"feature":"Capacity Management","_id":16},{"feature":"Conducting capacity management to contribute to quality assurance","_id":17},{"feature":"Purpose, goals and objectives","_id":16},{"feature":"Delivering against Service Level targets","_id":17},{"feature":"Meeting cost and time constraints","_id":16},{"feature":"Activities, methods and techniques","_id":17},{"feature":"Fit-for-purpose and fit-for-use","_id":17}]},{"heading":"Availability Management","_id":3,"listContent":[{"feature":"Contributing to quality for fit-for-purpose and fit-for-use services","_id":14},{"feature":"Scope of the process","_id":15},{"feature":"Enabling Availability Management through activities, methods and techniques","_id":16},{"feature":"How Availability Management creates business value","_id":15},{"feature":"Triggers, input and output to other processes","_id":16},{"feature":"Establishing metrics to ensure process quality","_id":16}]},{"heading":"IT Service Continuity Management (ITSC)","_id":3,"listContent":[{"feature":"Ensuring quality assurance when introducing services through effective ITSC management","_id":14},{"feature":"Illustrating the main activities","_id":15},{"feature":"Managing risks","_id":16},{"feature":"Planning for recovery","_id":16},{"feature":"Policies and principles","_id":16},{"feature":"Challenges and critical success factors","_id":16}]},{"heading":"Information Security Management","_id":3,"listContent":[{"feature":"Analyzing how Information Security Management contributes to quality assurance for new services","_id":14},{"feature":"Aligning IT security with business security","_id":15},{"feature":"Ensuring confidentiality, integrity and availability","_id":16},{"feature":"How Information Security Management generates business value","_id":15},{"feature":"Activities, methods and techniques","_id":16},{"feature":"Key metrics to measure success","_id":15}]},{"heading":"Demand Management","_id":3,"listContent":[{"feature":"Purpose, goals and objectives","_id":14},{"feature":"Influencing customer demand","_id":15},{"feature":"Coupling capacity with demand","_id":16},{"feature":"Activities, methods and techniques","_id":16}]},{"heading":"Risk Management","_id":3,"listContent":[{"feature":"Risks relative to the Planning, Protection and Optimization process management","_id":14},{"feature":"Identifying the challenges, critical success factors and risks related to the other processes","_id":15},{"feature":"The risks directly related with Service Design","_id":15},{"feature":"How risks relate to the practice elements of Planning, Protection and Optimization","_id":15}]},{"heading":"Roles and Responsibilities","_id":3,"listContent":[{"feature":"Capacity management","_id":14},{"feature":"Availability management","_id":15},{"feature":"IT Service Continuity management","_id":16},{"feature":"Information Security management","_id":16}]},{"heading":"Technology and Implementation Considerations","_id":3,"listContent":[{"feature":"Generic requirements and evaluation criteria","_id":14},{"feature":"Special technology functions and features related to Planning, Protection and Optimization","_id":15},{"feature":"Good practices for implementation","_id":16},{"feature":"Determining the evaluation criteria for technology and process implementation","_id":15},{"feature":"Challenges, critical success factors and risks","_id":15},{"feature":"Considerations for planning and implementing Service Management technologies","_id":15}]},{"heading":"Common Service Activities","_id":3,"listContent":[{"feature":"Analyzing operations performed in day-to-day activities","_id":14},{"feature":"The maturity model of technology management","_id":15},{"feature":"Aligning operations with the overall service and process objectives","_id":16},{"feature":"Service monitoring and control","_id":16}]},{"heading":"Continual Service Improvement","_id":3,"listContent":[{"feature":"Implementing an effective CSI program","_id":14},{"feature":"CSI in respect to organizational change","_id":14},{"feature":"Best practice elements of CSI","_id":14},{"feature":"Measuring service performance","_id":14},{"feature":"Cost benefit justification","_id":14}]}],"description":null,"_id":3}
[{"heading":"Introduction and Overview","_id":3,"listContent":[{"feature":"Planning, Protection and Optimization in the context of the Service Lifecycle","_id":14},{"feature":"The Service value proposition","_id":15},{"feature":"Role of processes in Service Management","_id":16},{"feature":"How Service Management creates business value Core Planning, Protection and Optimization Processes","_id":17},{"feature":"Capacity Management","_id":16},{"feature":"Conducting capacity management to contribute to quality assurance","_id":17},{"feature":"Purpose, goals and objectives","_id":16},{"feature":"Delivering against Service Level targets","_id":17},{"feature":"Meeting cost and time constraints","_id":16},{"feature":"Activities, methods and techniques","_id":17},{"feature":"Fit-for-purpose and fit-for-use","_id":17}]},{"heading":"Availability Management","_id":3,"listContent":[{"feature":"Contributing to quality for fit-for-purpose and fit-for-use services","_id":14},{"feature":"Scope of the process","_id":15},{"feature":"Enabling Availability Management through activities, methods and techniques","_id":16},{"feature":"How Availability Management creates business value","_id":15},{"feature":"Triggers, input and output to other processes","_id":16},{"feature":"Establishing metrics to ensure process quality","_id":16}]},{"heading":"IT Service Continuity Management (ITSC)","_id":3,"listContent":[{"feature":"Ensuring quality assurance when introducing services through effective ITSC management","_id":14},{"feature":"Illustrating the main activities","_id":15},{"feature":"Managing risks","_id":16},{"feature":"Planning for recovery","_id":16},{"feature":"Policies and principles","_id":16},{"feature":"Challenges and critical success factors","_id":16}]},{"heading":"Information Security Management","_id":3,"listContent":[{"feature":"Analyzing how Information Security Management contributes to quality assurance for new services","_id":14},{"feature":"Aligning IT security with business security","_id":15},{"feature":"Ensuring confidentiality, integrity and availability","_id":16},{"feature":"How Information Security Management generates business value","_id":15},{"feature":"Activities, methods and techniques","_id":16},{"feature":"Key metrics to measure success","_id":15}]},{"heading":"Demand Management","_id":3,"listContent":[{"feature":"Purpose, goals and objectives","_id":14},{"feature":"Influencing customer demand","_id":15},{"feature":"Coupling capacity with demand","_id":16},{"feature":"Activities, methods and techniques","_id":16}]},{"heading":"Risk Management","_id":3,"listContent":[{"feature":"Risks relative to the Planning, Protection and Optimization process management","_id":14},{"feature":"Identifying the challenges, critical success factors and risks related to the other processes","_id":15},{"feature":"The risks directly related with Service Design","_id":15},{"feature":"How risks relate to the practice elements of Planning, Protection and Optimization","_id":15}]},{"heading":"Roles and Responsibilities","_id":3,"listContent":[{"feature":"Capacity management","_id":14},{"feature":"Availability management","_id":15},{"feature":"IT Service Continuity management","_id":16},{"feature":"Information Security management","_id":16}]},{"heading":"Technology and Implementation Considerations","_id":3,"listContent":[{"feature":"Generic requirements and evaluation criteria","_id":14},{"feature":"Special technology functions and features related to Planning, Protection and Optimization","_id":15},{"feature":"Good practices for implementation","_id":16},{"feature":"Determining the evaluation criteria for technology and process implementation","_id":15},{"feature":"Challenges, critical success factors and risks","_id":15},{"feature":"Considerations for planning and implementing Service Management technologies","_id":15}]},{"heading":"Common Service Activities","_id":3,"listContent":[{"feature":"Analyzing operations performed in day-to-day activities","_id":14},{"feature":"The maturity model of technology management","_id":15},{"feature":"Aligning operations with the overall service and process objectives","_id":16},{"feature":"Service monitoring and control","_id":16}]},{"heading":"Continual Service Improvement","_id":3,"listContent":[{"feature":"Implementing an effective CSI program","_id":14},{"feature":"CSI in respect to organizational change","_id":14},{"feature":"Best practice elements of CSI","_id":14},{"feature":"Measuring service performance","_id":14},{"feature":"Cost benefit justification","_id":14}]}]
{"heading":"Introduction and Overview","_id":3,"listContent":[{"feature":"Planning, Protection and Optimization in the context of the Service Lifecycle","_id":14},{"feature":"The Service value proposition","_id":15},{"feature":"Role of processes in Service Management","_id":16},{"feature":"How Service Management creates business value Core Planning, Protection and Optimization Processes","_id":17},{"feature":"Capacity Management","_id":16},{"feature":"Conducting capacity management to contribute to quality assurance","_id":17},{"feature":"Purpose, goals and objectives","_id":16},{"feature":"Delivering against Service Level targets","_id":17},{"feature":"Meeting cost and time constraints","_id":16},{"feature":"Activities, methods and techniques","_id":17},{"feature":"Fit-for-purpose and fit-for-use","_id":17}]}

Introduction and Overview

3
[{"feature":"Planning, Protection and Optimization in the context of the Service Lifecycle","_id":14},{"feature":"The Service value proposition","_id":15},{"feature":"Role of processes in Service Management","_id":16},{"feature":"How Service Management creates business value Core Planning, Protection and Optimization Processes","_id":17},{"feature":"Capacity Management","_id":16},{"feature":"Conducting capacity management to contribute to quality assurance","_id":17},{"feature":"Purpose, goals and objectives","_id":16},{"feature":"Delivering against Service Level targets","_id":17},{"feature":"Meeting cost and time constraints","_id":16},{"feature":"Activities, methods and techniques","_id":17},{"feature":"Fit-for-purpose and fit-for-use","_id":17}]
{"feature":"Planning, Protection and Optimization in the context of the Service Lifecycle","_id":14}
Planning, Protection and Optimization in the context of the Service Lifecycle
14
{"feature":"The Service value proposition","_id":15}
The Service value proposition
15
{"feature":"Role of processes in Service Management","_id":16}
Role of processes in Service Management
16
{"feature":"How Service Management creates business value Core Planning, Protection and Optimization Processes","_id":17}
How Service Management creates business value Core Planning, Protection and Optimization Processes
17
{"feature":"Capacity Management","_id":16}
Capacity Management
16
{"feature":"Conducting capacity management to contribute to quality assurance","_id":17}
Conducting capacity management to contribute to quality assurance
17
{"feature":"Purpose, goals and objectives","_id":16}
Purpose, goals and objectives
16
{"feature":"Delivering against Service Level targets","_id":17}
Delivering against Service Level targets
17
{"feature":"Meeting cost and time constraints","_id":16}
Meeting cost and time constraints
16
{"feature":"Activities, methods and techniques","_id":17}
Activities, methods and techniques
17
{"feature":"Fit-for-purpose and fit-for-use","_id":17}
Fit-for-purpose and fit-for-use
17
{"heading":"Availability Management","_id":3,"listContent":[{"feature":"Contributing to quality for fit-for-purpose and fit-for-use services","_id":14},{"feature":"Scope of the process","_id":15},{"feature":"Enabling Availability Management through activities, methods and techniques","_id":16},{"feature":"How Availability Management creates business value","_id":15},{"feature":"Triggers, input and output to other processes","_id":16},{"feature":"Establishing metrics to ensure process quality","_id":16}]}

Availability Management

3
[{"feature":"Contributing to quality for fit-for-purpose and fit-for-use services","_id":14},{"feature":"Scope of the process","_id":15},{"feature":"Enabling Availability Management through activities, methods and techniques","_id":16},{"feature":"How Availability Management creates business value","_id":15},{"feature":"Triggers, input and output to other processes","_id":16},{"feature":"Establishing metrics to ensure process quality","_id":16}]
{"feature":"Contributing to quality for fit-for-purpose and fit-for-use services","_id":14}
Contributing to quality for fit-for-purpose and fit-for-use services
14
{"feature":"Scope of the process","_id":15}
Scope of the process
15
{"feature":"Enabling Availability Management through activities, methods and techniques","_id":16}
Enabling Availability Management through activities, methods and techniques
16
{"feature":"How Availability Management creates business value","_id":15}
How Availability Management creates business value
15
{"feature":"Triggers, input and output to other processes","_id":16}
Triggers, input and output to other processes
16
{"feature":"Establishing metrics to ensure process quality","_id":16}
Establishing metrics to ensure process quality
16
{"heading":"IT Service Continuity Management (ITSC)","_id":3,"listContent":[{"feature":"Ensuring quality assurance when introducing services through effective ITSC management","_id":14},{"feature":"Illustrating the main activities","_id":15},{"feature":"Managing risks","_id":16},{"feature":"Planning for recovery","_id":16},{"feature":"Policies and principles","_id":16},{"feature":"Challenges and critical success factors","_id":16}]}

IT Service Continuity Management (ITSC)

3
[{"feature":"Ensuring quality assurance when introducing services through effective ITSC management","_id":14},{"feature":"Illustrating the main activities","_id":15},{"feature":"Managing risks","_id":16},{"feature":"Planning for recovery","_id":16},{"feature":"Policies and principles","_id":16},{"feature":"Challenges and critical success factors","_id":16}]
{"feature":"Ensuring quality assurance when introducing services through effective ITSC management","_id":14}
Ensuring quality assurance when introducing services through effective ITSC management
14
{"feature":"Illustrating the main activities","_id":15}
Illustrating the main activities
15
{"feature":"Managing risks","_id":16}
Managing risks
16
{"feature":"Planning for recovery","_id":16}
Planning for recovery
16
{"feature":"Policies and principles","_id":16}
Policies and principles
16
{"feature":"Challenges and critical success factors","_id":16}
Challenges and critical success factors
16
{"heading":"Information Security Management","_id":3,"listContent":[{"feature":"Analyzing how Information Security Management contributes to quality assurance for new services","_id":14},{"feature":"Aligning IT security with business security","_id":15},{"feature":"Ensuring confidentiality, integrity and availability","_id":16},{"feature":"How Information Security Management generates business value","_id":15},{"feature":"Activities, methods and techniques","_id":16},{"feature":"Key metrics to measure success","_id":15}]}

Information Security Management

3
[{"feature":"Analyzing how Information Security Management contributes to quality assurance for new services","_id":14},{"feature":"Aligning IT security with business security","_id":15},{"feature":"Ensuring confidentiality, integrity and availability","_id":16},{"feature":"How Information Security Management generates business value","_id":15},{"feature":"Activities, methods and techniques","_id":16},{"feature":"Key metrics to measure success","_id":15}]
{"feature":"Analyzing how Information Security Management contributes to quality assurance for new services","_id":14}
Analyzing how Information Security Management contributes to quality assurance for new services
14
{"feature":"Aligning IT security with business security","_id":15}
Aligning IT security with business security
15
{"feature":"Ensuring confidentiality, integrity and availability","_id":16}
Ensuring confidentiality, integrity and availability
16
{"feature":"How Information Security Management generates business value","_id":15}
How Information Security Management generates business value
15
{"feature":"Activities, methods and techniques","_id":16}
Activities, methods and techniques
16
{"feature":"Key metrics to measure success","_id":15}
Key metrics to measure success
15
{"heading":"Demand Management","_id":3,"listContent":[{"feature":"Purpose, goals and objectives","_id":14},{"feature":"Influencing customer demand","_id":15},{"feature":"Coupling capacity with demand","_id":16},{"feature":"Activities, methods and techniques","_id":16}]}

Demand Management

3
[{"feature":"Purpose, goals and objectives","_id":14},{"feature":"Influencing customer demand","_id":15},{"feature":"Coupling capacity with demand","_id":16},{"feature":"Activities, methods and techniques","_id":16}]
{"feature":"Purpose, goals and objectives","_id":14}
Purpose, goals and objectives
14
{"feature":"Influencing customer demand","_id":15}
Influencing customer demand
15
{"feature":"Coupling capacity with demand","_id":16}
Coupling capacity with demand
16
{"feature":"Activities, methods and techniques","_id":16}
Activities, methods and techniques
16
{"heading":"Risk Management","_id":3,"listContent":[{"feature":"Risks relative to the Planning, Protection and Optimization process management","_id":14},{"feature":"Identifying the challenges, critical success factors and risks related to the other processes","_id":15},{"feature":"The risks directly related with Service Design","_id":15},{"feature":"How risks relate to the practice elements of Planning, Protection and Optimization","_id":15}]}

Risk Management

3
[{"feature":"Risks relative to the Planning, Protection and Optimization process management","_id":14},{"feature":"Identifying the challenges, critical success factors and risks related to the other processes","_id":15},{"feature":"The risks directly related with Service Design","_id":15},{"feature":"How risks relate to the practice elements of Planning, Protection and Optimization","_id":15}]
{"feature":"Risks relative to the Planning, Protection and Optimization process management","_id":14}
Risks relative to the Planning, Protection and Optimization process management
14
{"feature":"Identifying the challenges, critical success factors and risks related to the other processes","_id":15}
Identifying the challenges, critical success factors and risks related to the other processes
15
{"feature":"The risks directly related with Service Design","_id":15}
The risks directly related with Service Design
15
{"feature":"How risks relate to the practice elements of Planning, Protection and Optimization","_id":15}
How risks relate to the practice elements of Planning, Protection and Optimization
15
{"heading":"Roles and Responsibilities","_id":3,"listContent":[{"feature":"Capacity management","_id":14},{"feature":"Availability management","_id":15},{"feature":"IT Service Continuity management","_id":16},{"feature":"Information Security management","_id":16}]}

Roles and Responsibilities

3
[{"feature":"Capacity management","_id":14},{"feature":"Availability management","_id":15},{"feature":"IT Service Continuity management","_id":16},{"feature":"Information Security management","_id":16}]
{"feature":"Capacity management","_id":14}
Capacity management
14
{"feature":"Availability management","_id":15}
Availability management
15
{"feature":"IT Service Continuity management","_id":16}
IT Service Continuity management
16
{"feature":"Information Security management","_id":16}
Information Security management
16
{"heading":"Technology and Implementation Considerations","_id":3,"listContent":[{"feature":"Generic requirements and evaluation criteria","_id":14},{"feature":"Special technology functions and features related to Planning, Protection and Optimization","_id":15},{"feature":"Good practices for implementation","_id":16},{"feature":"Determining the evaluation criteria for technology and process implementation","_id":15},{"feature":"Challenges, critical success factors and risks","_id":15},{"feature":"Considerations for planning and implementing Service Management technologies","_id":15}]}

Technology and Implementation Considerations

3
[{"feature":"Generic requirements and evaluation criteria","_id":14},{"feature":"Special technology functions and features related to Planning, Protection and Optimization","_id":15},{"feature":"Good practices for implementation","_id":16},{"feature":"Determining the evaluation criteria for technology and process implementation","_id":15},{"feature":"Challenges, critical success factors and risks","_id":15},{"feature":"Considerations for planning and implementing Service Management technologies","_id":15}]
{"feature":"Generic requirements and evaluation criteria","_id":14}
Generic requirements and evaluation criteria
14
{"feature":"Special technology functions and features related to Planning, Protection and Optimization","_id":15}
Special technology functions and features related to Planning, Protection and Optimization
15
{"feature":"Good practices for implementation","_id":16}
Good practices for implementation
16
{"feature":"Determining the evaluation criteria for technology and process implementation","_id":15}
Determining the evaluation criteria for technology and process implementation
15
{"feature":"Challenges, critical success factors and risks","_id":15}
Challenges, critical success factors and risks
15
{"feature":"Considerations for planning and implementing Service Management technologies","_id":15}
Considerations for planning and implementing Service Management technologies
15
{"heading":"Common Service Activities","_id":3,"listContent":[{"feature":"Analyzing operations performed in day-to-day activities","_id":14},{"feature":"The maturity model of technology management","_id":15},{"feature":"Aligning operations with the overall service and process objectives","_id":16},{"feature":"Service monitoring and control","_id":16}]}

Common Service Activities

3
[{"feature":"Analyzing operations performed in day-to-day activities","_id":14},{"feature":"The maturity model of technology management","_id":15},{"feature":"Aligning operations with the overall service and process objectives","_id":16},{"feature":"Service monitoring and control","_id":16}]
{"feature":"Analyzing operations performed in day-to-day activities","_id":14}
Analyzing operations performed in day-to-day activities
14
{"feature":"The maturity model of technology management","_id":15}
The maturity model of technology management
15
{"feature":"Aligning operations with the overall service and process objectives","_id":16}
Aligning operations with the overall service and process objectives
16
{"feature":"Service monitoring and control","_id":16}
Service monitoring and control
16
{"heading":"Continual Service Improvement","_id":3,"listContent":[{"feature":"Implementing an effective CSI program","_id":14},{"feature":"CSI in respect to organizational change","_id":14},{"feature":"Best practice elements of CSI","_id":14},{"feature":"Measuring service performance","_id":14},{"feature":"Cost benefit justification","_id":14}]}

Continual Service Improvement

3
[{"feature":"Implementing an effective CSI program","_id":14},{"feature":"CSI in respect to organizational change","_id":14},{"feature":"Best practice elements of CSI","_id":14},{"feature":"Measuring service performance","_id":14},{"feature":"Cost benefit justification","_id":14}]
{"feature":"Implementing an effective CSI program","_id":14}
Implementing an effective CSI program
14
{"feature":"CSI in respect to organizational change","_id":14}
CSI in respect to organizational change
14
{"feature":"Best practice elements of CSI","_id":14}
Best practice elements of CSI
14
{"feature":"Measuring service performance","_id":14}
Measuring service performance
14
{"feature":"Cost benefit justification","_id":14}
Cost benefit justification
14
3
3
{"tabName":"About the Examination","tabNumber":6,"content":{"ParamDetails":{"features":[{"heading":null,"_id":4,"listContent":[{"feature":"Evidence of ITILŪ Foundation Certificate or ITILŪ v2 Foundation + v3 Foundation Bridge Certificate ","_id":36},{"feature":"It is recommended that students should complete at least 12 hours of personal study by reviewing the syllabus and the associated areas of the ITILŪ Service Management Practice core guidance, in particular Service Strategy, Service Design and Service Transition publications in preparation for the examination.","_id":37},{"feature":"The exam is a closed book exam with eight (8) multiple choice, scenario-based, gradient scored questions","_id":38},{"feature":"Exam duration is a maximum 90 minutes for all candidates (candidates sitting the examination in a language other than their first language have a maximum of 120 minutes and are allowed to use a dictionary)","_id":39},{"feature":"Each question will have 4 possible answer options, one of which worth 5 marks is, one which worth 3 marks is, one which worth 1 mark is, and one which a distracter is and achieves no marks.","_id":40},{"feature":"Pass score is 28/40 or 70%","_id":41}]}],"description":null,"_id":4},"_id":4}}
About the Examination
6
{"ParamDetails":{"features":[{"heading":null,"_id":4,"listContent":[{"feature":"Evidence of ITILŪ Foundation Certificate or ITILŪ v2 Foundation + v3 Foundation Bridge Certificate ","_id":36},{"feature":"It is recommended that students should complete at least 12 hours of personal study by reviewing the syllabus and the associated areas of the ITILŪ Service Management Practice core guidance, in particular Service Strategy, Service Design and Service Transition publications in preparation for the examination.","_id":37},{"feature":"The exam is a closed book exam with eight (8) multiple choice, scenario-based, gradient scored questions","_id":38},{"feature":"Exam duration is a maximum 90 minutes for all candidates (candidates sitting the examination in a language other than their first language have a maximum of 120 minutes and are allowed to use a dictionary)","_id":39},{"feature":"Each question will have 4 possible answer options, one of which worth 5 marks is, one which worth 3 marks is, one which worth 1 mark is, and one which a distracter is and achieves no marks.","_id":40},{"feature":"Pass score is 28/40 or 70%","_id":41}]}],"description":null,"_id":4},"_id":4}
{"features":[{"heading":null,"_id":4,"listContent":[{"feature":"Evidence of ITILŪ Foundation Certificate or ITILŪ v2 Foundation + v3 Foundation Bridge Certificate ","_id":36},{"feature":"It is recommended that students should complete at least 12 hours of personal study by reviewing the syllabus and the associated areas of the ITILŪ Service Management Practice core guidance, in particular Service Strategy, Service Design and Service Transition publications in preparation for the examination.","_id":37},{"feature":"The exam is a closed book exam with eight (8) multiple choice, scenario-based, gradient scored questions","_id":38},{"feature":"Exam duration is a maximum 90 minutes for all candidates (candidates sitting the examination in a language other than their first language have a maximum of 120 minutes and are allowed to use a dictionary)","_id":39},{"feature":"Each question will have 4 possible answer options, one of which worth 5 marks is, one which worth 3 marks is, one which worth 1 mark is, and one which a distracter is and achieves no marks.","_id":40},{"feature":"Pass score is 28/40 or 70%","_id":41}]}],"description":null,"_id":4}
[{"heading":null,"_id":4,"listContent":[{"feature":"Evidence of ITILŪ Foundation Certificate or ITILŪ v2 Foundation + v3 Foundation Bridge Certificate ","_id":36},{"feature":"It is recommended that students should complete at least 12 hours of personal study by reviewing the syllabus and the associated areas of the ITILŪ Service Management Practice core guidance, in particular Service Strategy, Service Design and Service Transition publications in preparation for the examination.","_id":37},{"feature":"The exam is a closed book exam with eight (8) multiple choice, scenario-based, gradient scored questions","_id":38},{"feature":"Exam duration is a maximum 90 minutes for all candidates (candidates sitting the examination in a language other than their first language have a maximum of 120 minutes and are allowed to use a dictionary)","_id":39},{"feature":"Each question will have 4 possible answer options, one of which worth 5 marks is, one which worth 3 marks is, one which worth 1 mark is, and one which a distracter is and achieves no marks.","_id":40},{"feature":"Pass score is 28/40 or 70%","_id":41}]}]
{"heading":null,"_id":4,"listContent":[{"feature":"Evidence of ITILŪ Foundation Certificate or ITILŪ v2 Foundation + v3 Foundation Bridge Certificate ","_id":36},{"feature":"It is recommended that students should complete at least 12 hours of personal study by reviewing the syllabus and the associated areas of the ITILŪ Service Management Practice core guidance, in particular Service Strategy, Service Design and Service Transition publications in preparation for the examination.","_id":37},{"feature":"The exam is a closed book exam with eight (8) multiple choice, scenario-based, gradient scored questions","_id":38},{"feature":"Exam duration is a maximum 90 minutes for all candidates (candidates sitting the examination in a language other than their first language have a maximum of 120 minutes and are allowed to use a dictionary)","_id":39},{"feature":"Each question will have 4 possible answer options, one of which worth 5 marks is, one which worth 3 marks is, one which worth 1 mark is, and one which a distracter is and achieves no marks.","_id":40},{"feature":"Pass score is 28/40 or 70%","_id":41}]}
4
[{"feature":"Evidence of ITILŪ Foundation Certificate or ITILŪ v2 Foundation + v3 Foundation Bridge Certificate ","_id":36},{"feature":"It is recommended that students should complete at least 12 hours of personal study by reviewing the syllabus and the associated areas of the ITILŪ Service Management Practice core guidance, in particular Service Strategy, Service Design and Service Transition publications in preparation for the examination.","_id":37},{"feature":"The exam is a closed book exam with eight (8) multiple choice, scenario-based, gradient scored questions","_id":38},{"feature":"Exam duration is a maximum 90 minutes for all candidates (candidates sitting the examination in a language other than their first language have a maximum of 120 minutes and are allowed to use a dictionary)","_id":39},{"feature":"Each question will have 4 possible answer options, one of which worth 5 marks is, one which worth 3 marks is, one which worth 1 mark is, and one which a distracter is and achieves no marks.","_id":40},{"feature":"Pass score is 28/40 or 70%","_id":41}]
{"feature":"Evidence of ITILŪ Foundation Certificate or ITILŪ v2 Foundation + v3 Foundation Bridge Certificate ","_id":36}
Evidence of ITILŪ Foundation Certificate or ITILŪ v2 Foundation + v3 Foundation Bridge Certificate
36
{"feature":"It is recommended that students should complete at least 12 hours of personal study by reviewing the syllabus and the associated areas of the ITILŪ Service Management Practice core guidance, in particular Service Strategy, Service Design and Service Transition publications in preparation for the examination.","_id":37}
It is recommended that students should complete at least 12 hours of personal study by reviewing the syllabus and the associated areas of the ITILŪ Service Management Practice core guidance, in particular Service Strategy, Service Design and Service Transition publications in preparation for the examination.
37
{"feature":"The exam is a closed book exam with eight (8) multiple choice, scenario-based, gradient scored questions","_id":38}
The exam is a closed book exam with eight (8) multiple choice, scenario-based, gradient scored questions
38
{"feature":"Exam duration is a maximum 90 minutes for all candidates (candidates sitting the examination in a language other than their first language have a maximum of 120 minutes and are allowed to use a dictionary)","_id":39}
Exam duration is a maximum 90 minutes for all candidates (candidates sitting the examination in a language other than their first language have a maximum of 120 minutes and are allowed to use a dictionary)
39
{"feature":"Each question will have 4 possible answer options, one of which worth 5 marks is, one which worth 3 marks is, one which worth 1 mark is, and one which a distracter is and achieves no marks.","_id":40}
Each question will have 4 possible answer options, one of which worth 5 marks is, one which worth 3 marks is, one which worth 1 mark is, and one which a distracter is and achieves no marks.
40
{"feature":"Pass score is 28/40 or 70%","_id":41}
Pass score is 28/40 or 70%
41
4
4
{"tabName":"Course Advisor","tabNumber":7,"content":{"advisiorName":"Ajit Joshi","advisiorDescription":"","imageName":"/ajit-joshi.jpg","imageUrl":"/images","width":"100","disabled":true,"_id":1,"designation":"Associate Vice President and Head \u2013 Governance and Enterprise Transformation in IT Service Management (GeTSM)","achivements":[{"achivement":"8 + years of experience in IT operations, Service Management, Training","_id":1},{"achivement":"Trained more than 1000 + professionals on technology & upselling, and Best Management Practices, like ITILŪ, COBIT, Six Sigma, Prince 2.","_id":2},{"achivement":"ITILŪ Release, Control and Validation Certified.","_id":2},{"achivement":"ITILŪ Service Offering and Agreement Certified.","_id":2},{"achivement":"ITILŪ Planning, Protection and Optimization Certified.","_id":2}],"class":"button","version":"2.0","height":"10"}}
Course Advisor
7
{"advisiorName":"Ajit Joshi","advisiorDescription":"","imageName":"/ajit-joshi.jpg","imageUrl":"/images","width":"100","disabled":true,"_id":1,"designation":"Associate Vice President and Head \u2013 Governance and Enterprise Transformation in IT Service Management (GeTSM)","achivements":[{"achivement":"8 + years of experience in IT operations, Service Management, Training","_id":1},{"achivement":"Trained more than 1000 + professionals on technology & upselling, and Best Management Practices, like ITILŪ, COBIT, Six Sigma, Prince 2.","_id":2},{"achivement":"ITILŪ Release, Control and Validation Certified.","_id":2},{"achivement":"ITILŪ Service Offering and Agreement Certified.","_id":2},{"achivement":"ITILŪ Planning, Protection and Optimization Certified.","_id":2}],"class":"button","version":"2.0","height":"10"}

Ajit Joshi

/ajit-joshi.jpg
/images
100
true
1
Associate Vice President and Head ? Governance and Enterprise Transformation in IT Service Management (GeTSM)
[{"achivement":"8 + years of experience in IT operations, Service Management, Training","_id":1},{"achivement":"Trained more than 1000 + professionals on technology & upselling, and Best Management Practices, like ITILŪ, COBIT, Six Sigma, Prince 2.","_id":2},{"achivement":"ITILŪ Release, Control and Validation Certified.","_id":2},{"achivement":"ITILŪ Service Offering and Agreement Certified.","_id":2},{"achivement":"ITILŪ Planning, Protection and Optimization Certified.","_id":2}]
{"achivement":"8 + years of experience in IT operations, Service Management, Training","_id":1}
8 + years of experience in IT operations, Service Management, Training
1
{"achivement":"Trained more than 1000 + professionals on technology & upselling, and Best Management Practices, like ITILŪ, COBIT, Six Sigma, Prince 2.","_id":2}
Trained more than 1000 + professionals on technology & upselling, and Best Management Practices, like ITILŪ, COBIT, Six Sigma, Prince 2.
2
{"achivement":"ITILŪ Release, Control and Validation Certified.","_id":2}
ITILŪ Release, Control and Validation Certified.
2
{"achivement":"ITILŪ Service Offering and Agreement Certified.","_id":2}
ITILŪ Service Offering and Agreement Certified.
2
{"achivement":"ITILŪ Planning, Protection and Optimization Certified.","_id":2}
ITILŪ Planning, Protection and Optimization Certified.
2
button
2.0
10
{"tabName":"FAQ","tabNumber":8,"content":{"ParamDetails":{"features":[{"heading":"What is ITILŪ PPO Certification?","_id":4,"listContent":[{"feature":"This course provides comprehensive training for anyone involved in provision, support, and delivery of IT Services.","_id":62}]},{"heading":"What is the Eligibility Criteria / Pre-requisites for the ITILŪ PPO Exam?","_id":4,"listContent":[{"feature":"Evidence of ITILŪ Foundation Certificate or ITILŪ v2 Foundation + v3 Foundation Bridge Certificate ","_id":62}]},{"heading":"What is the duration of training?","_id":4,"listContent":[{"feature":"Training duration is 2-3 days.","_id":62}]},{"heading":"Do you provide certificates on successfully completing the course?","_id":4,"listContent":[{"feature":"Yes, at the end of the class, we will execute PeopleCert exams. After passing the exam you will receive soft copy of certificate on your email which states that you have successfully completed the course","_id":62}]},{"heading":"When are the classes conducted?","_id":4,"listContent":[{"feature":"All open house sessions are conducted on weekends only. For in-house sessions, it can be as per the customer requested schedule.","_id":62}]},{"heading":"What all is included in the course?","_id":4,"listContent":[{"feature":"Along with facilitating training sessions, we provide required course material and practice questions for exam preparation","_id":62}]},{"heading":"Who conduct the training sessions?","_id":4,"listContent":[{"feature":"Training sessions are facilitated by certified experts having practical working experience as well as training experience. ","_id":62}]},{"heading":"Why one should join Vinsys?","_id":4,"listContent":[{"feature":"We are Accredited Training Organization ","_id":62},{"feature":"Experiential Education","_id":62},{"feature":"Experienced Industry Experts","_id":62},{"feature":"Accredited course material","_id":62},{"feature":"Quality Courseware","_id":62},{"feature":"Post training support","_id":62}]}],"description":null,"_id":4},"_id":7}}
FAQ
8
{"ParamDetails":{"features":[{"heading":"What is ITILŪ PPO Certification?","_id":4,"listContent":[{"feature":"This course provides comprehensive training for anyone involved in provision, support, and delivery of IT Services.","_id":62}]},{"heading":"What is the Eligibility Criteria / Pre-requisites for the ITILŪ PPO Exam?","_id":4,"listContent":[{"feature":"Evidence of ITILŪ Foundation Certificate or ITILŪ v2 Foundation + v3 Foundation Bridge Certificate ","_id":62}]},{"heading":"What is the duration of training?","_id":4,"listContent":[{"feature":"Training duration is 2-3 days.","_id":62}]},{"heading":"Do you provide certificates on successfully completing the course?","_id":4,"listContent":[{"feature":"Yes, at the end of the class, we will execute PeopleCert exams. After passing the exam you will receive soft copy of certificate on your email which states that you have successfully completed the course","_id":62}]},{"heading":"When are the classes conducted?","_id":4,"listContent":[{"feature":"All open house sessions are conducted on weekends only. For in-house sessions, it can be as per the customer requested schedule.","_id":62}]},{"heading":"What all is included in the course?","_id":4,"listContent":[{"feature":"Along with facilitating training sessions, we provide required course material and practice questions for exam preparation","_id":62}]},{"heading":"Who conduct the training sessions?","_id":4,"listContent":[{"feature":"Training sessions are facilitated by certified experts having practical working experience as well as training experience. ","_id":62}]},{"heading":"Why one should join Vinsys?","_id":4,"listContent":[{"feature":"We are Accredited Training Organization ","_id":62},{"feature":"Experiential Education","_id":62},{"feature":"Experienced Industry Experts","_id":62},{"feature":"Accredited course material","_id":62},{"feature":"Quality Courseware","_id":62},{"feature":"Post training support","_id":62}]}],"description":null,"_id":4},"_id":7}
{"features":[{"heading":"What is ITILŪ PPO Certification?","_id":4,"listContent":[{"feature":"This course provides comprehensive training for anyone involved in provision, support, and delivery of IT Services.","_id":62}]},{"heading":"What is the Eligibility Criteria / Pre-requisites for the ITILŪ PPO Exam?","_id":4,"listContent":[{"feature":"Evidence of ITILŪ Foundation Certificate or ITILŪ v2 Foundation + v3 Foundation Bridge Certificate ","_id":62}]},{"heading":"What is the duration of training?","_id":4,"listContent":[{"feature":"Training duration is 2-3 days.","_id":62}]},{"heading":"Do you provide certificates on successfully completing the course?","_id":4,"listContent":[{"feature":"Yes, at the end of the class, we will execute PeopleCert exams. After passing the exam you will receive soft copy of certificate on your email which states that you have successfully completed the course","_id":62}]},{"heading":"When are the classes conducted?","_id":4,"listContent":[{"feature":"All open house sessions are conducted on weekends only. For in-house sessions, it can be as per the customer requested schedule.","_id":62}]},{"heading":"What all is included in the course?","_id":4,"listContent":[{"feature":"Along with facilitating training sessions, we provide required course material and practice questions for exam preparation","_id":62}]},{"heading":"Who conduct the training sessions?","_id":4,"listContent":[{"feature":"Training sessions are facilitated by certified experts having practical working experience as well as training experience. ","_id":62}]},{"heading":"Why one should join Vinsys?","_id":4,"listContent":[{"feature":"We are Accredited Training Organization ","_id":62},{"feature":"Experiential Education","_id":62},{"feature":"Experienced Industry Experts","_id":62},{"feature":"Accredited course material","_id":62},{"feature":"Quality Courseware","_id":62},{"feature":"Post training support","_id":62}]}],"description":null,"_id":4}
[{"heading":"What is ITILŪ PPO Certification?","_id":4,"listContent":[{"feature":"This course provides comprehensive training for anyone involved in provision, support, and delivery of IT Services.","_id":62}]},{"heading":"What is the Eligibility Criteria / Pre-requisites for the ITILŪ PPO Exam?","_id":4,"listContent":[{"feature":"Evidence of ITILŪ Foundation Certificate or ITILŪ v2 Foundation + v3 Foundation Bridge Certificate ","_id":62}]},{"heading":"What is the duration of training?","_id":4,"listContent":[{"feature":"Training duration is 2-3 days.","_id":62}]},{"heading":"Do you provide certificates on successfully completing the course?","_id":4,"listContent":[{"feature":"Yes, at the end of the class, we will execute PeopleCert exams. After passing the exam you will receive soft copy of certificate on your email which states that you have successfully completed the course","_id":62}]},{"heading":"When are the classes conducted?","_id":4,"listContent":[{"feature":"All open house sessions are conducted on weekends only. For in-house sessions, it can be as per the customer requested schedule.","_id":62}]},{"heading":"What all is included in the course?","_id":4,"listContent":[{"feature":"Along with facilitating training sessions, we provide required course material and practice questions for exam preparation","_id":62}]},{"heading":"Who conduct the training sessions?","_id":4,"listContent":[{"feature":"Training sessions are facilitated by certified experts having practical working experience as well as training experience. ","_id":62}]},{"heading":"Why one should join Vinsys?","_id":4,"listContent":[{"feature":"We are Accredited Training Organization ","_id":62},{"feature":"Experiential Education","_id":62},{"feature":"Experienced Industry Experts","_id":62},{"feature":"Accredited course material","_id":62},{"feature":"Quality Courseware","_id":62},{"feature":"Post training support","_id":62}]}]
{"heading":"What is ITILŪ PPO Certification?","_id":4,"listContent":[{"feature":"This course provides comprehensive training for anyone involved in provision, support, and delivery of IT Services.","_id":62}]}

What is ITILŪ PPO Certification?

4
[{"feature":"This course provides comprehensive training for anyone involved in provision, support, and delivery of IT Services.","_id":62}]
{"feature":"This course provides comprehensive training for anyone involved in provision, support, and delivery of IT Services.","_id":62}
This course provides comprehensive training for anyone involved in provision, support, and delivery of IT Services.
62
{"heading":"What is the Eligibility Criteria / Pre-requisites for the ITILŪ PPO Exam?","_id":4,"listContent":[{"feature":"Evidence of ITILŪ Foundation Certificate or ITILŪ v2 Foundation + v3 Foundation Bridge Certificate ","_id":62}]}

What is the Eligibility Criteria / Pre-requisites for the ITILŪ PPO Exam?

4
[{"feature":"Evidence of ITILŪ Foundation Certificate or ITILŪ v2 Foundation + v3 Foundation Bridge Certificate ","_id":62}]
{"feature":"Evidence of ITILŪ Foundation Certificate or ITILŪ v2 Foundation + v3 Foundation Bridge Certificate ","_id":62}
Evidence of ITILŪ Foundation Certificate or ITILŪ v2 Foundation + v3 Foundation Bridge Certificate
62
{"heading":"What is the duration of training?","_id":4,"listContent":[{"feature":"Training duration is 2-3 days.","_id":62}]}

What is the duration of training?

4
[{"feature":"Training duration is 2-3 days.","_id":62}]
{"feature":"Training duration is 2-3 days.","_id":62}
Training duration is 2-3 days.
62
{"heading":"Do you provide certificates on successfully completing the course?","_id":4,"listContent":[{"feature":"Yes, at the end of the class, we will execute PeopleCert exams. After passing the exam you will receive soft copy of certificate on your email which states that you have successfully completed the course","_id":62}]}

Do you provide certificates on successfully completing the course?

4
[{"feature":"Yes, at the end of the class, we will execute PeopleCert exams. After passing the exam you will receive soft copy of certificate on your email which states that you have successfully completed the course","_id":62}]
{"feature":"Yes, at the end of the class, we will execute PeopleCert exams. After passing the exam you will receive soft copy of certificate on your email which states that you have successfully completed the course","_id":62}
Yes, at the end of the class, we will execute PeopleCert exams. After passing the exam you will receive soft copy of certificate on your email which states that you have successfully completed the course
62
{"heading":"When are the classes conducted?","_id":4,"listContent":[{"feature":"All open house sessions are conducted on weekends only. For in-house sessions, it can be as per the customer requested schedule.","_id":62}]}

When are the classes conducted?

4
[{"feature":"All open house sessions are conducted on weekends only. For in-house sessions, it can be as per the customer requested schedule.","_id":62}]
{"feature":"All open house sessions are conducted on weekends only. For in-house sessions, it can be as per the customer requested schedule.","_id":62}
All open house sessions are conducted on weekends only. For in-house sessions, it can be as per the customer requested schedule.
62
{"heading":"What all is included in the course?","_id":4,"listContent":[{"feature":"Along with facilitating training sessions, we provide required course material and practice questions for exam preparation","_id":62}]}

What all is included in the course?

4
[{"feature":"Along with facilitating training sessions, we provide required course material and practice questions for exam preparation","_id":62}]
{"feature":"Along with facilitating training sessions, we provide required course material and practice questions for exam preparation","_id":62}
Along with facilitating training sessions, we provide required course material and practice questions for exam preparation
62
{"heading":"Who conduct the training sessions?","_id":4,"listContent":[{"feature":"Training sessions are facilitated by certified experts having practical working experience as well as training experience. ","_id":62}]}

Who conduct the training sessions?

4
[{"feature":"Training sessions are facilitated by certified experts having practical working experience as well as training experience. ","_id":62}]
{"feature":"Training sessions are facilitated by certified experts having practical working experience as well as training experience. ","_id":62}
Training sessions are facilitated by certified experts having practical working experience as well as training experience.
62
{"heading":"Why one should join Vinsys?","_id":4,"listContent":[{"feature":"We are Accredited Training Organization ","_id":62},{"feature":"Experiential Education","_id":62},{"feature":"Experienced Industry Experts","_id":62},{"feature":"Accredited course material","_id":62},{"feature":"Quality Courseware","_id":62},{"feature":"Post training support","_id":62}]}

Why one should join Vinsys?

4
[{"feature":"We are Accredited Training Organization ","_id":62},{"feature":"Experiential Education","_id":62},{"feature":"Experienced Industry Experts","_id":62},{"feature":"Accredited course material","_id":62},{"feature":"Quality Courseware","_id":62},{"feature":"Post training support","_id":62}]
{"feature":"We are Accredited Training Organization ","_id":62}
We are Accredited Training Organization
62
{"feature":"Experiential Education","_id":62}
Experiential Education
62
{"feature":"Experienced Industry Experts","_id":62}
Experienced Industry Experts
62
{"feature":"Accredited course material","_id":62}
Accredited course material
62
{"feature":"Quality Courseware","_id":62}
Quality Courseware
62
{"feature":"Post training support","_id":62}
Post training support
62
4
7
5ae318c146290c041ca53897
{"courses":[{"courseDuratoin":null,"subCategory":"Quality and Process Training","courseRating":4,"courseSummary":"The Lean Six Sigma Black Belt program is a continuation from where the green belt syllabus reached its conclusion. It should be noted that you are eligible for this course only if you have successfully completed the Six Sigma Green belt. Studying for Lean Six Sigma Certification will enable an improved analytical thinking, strengthen creative problem solving and devise strategic thinking. The 6 Sigma training is a combination of Lecture, Class exercise, Case studies, Team Exercise and a problem-solving approach. Participants will need to complete a Demo Project, which they will have to solve, document and submit in the classroom. On successful submission of project, they are eligible to appear for Six Sigma Black Belt Examination. On clearing of the exam, they will receive \u201cTrained Six Sigma Black Belt\u201d Certificate. Within 3 months of clearing Six Sigma Master Black Belt exam, participants will have to submit their presentations of a real time Six Sigma Project Implementation in their process or organization. On approval of the same, participants will receive \u201cCertified Six Sigma Black Belt\u201d Certificate.","pageId":"six-sigma-black-belt","countOfLearner":14000,"ratingCount":2800,"categoryName":"Business And Process Framework Training And Certification","productVideoLink":"https://www.youtube.com/embed/pgYP6ykVmvY","mode":"ClassRoom","catID":"quality-and-process-training","courseName":"Six Sigma Black Belt Training and Certification","courseImage":"six-sigma-black-belt-certification.png","common":true,"courseImagePath":"images/","countryCode":null,"averageRating":4,"courseStartsOn":"","pageURL":"/quality-and-process-training/six-sigma-black-belt","id":null,"batchType":"WeekDay","isFavourite":null},{"courseDuratoin":null,"subCategory":"IT GOVERNANCE","courseRating":4,"courseSummary":"The COBIT 5 Assessor course confirms you have sufficient knowledge and understanding of the Assessor. Cobit 5 Framework provides a basis for measuring an organization\u2019s process capabilities against the COBIT 5 Process Assessment Model (PAM). The course is covered over 2 days and shows you the business end-to-end. This helps you effectively govern and manage organization IT. Developed for anyone interested in obtaining Assessor-level knowledge of COBIT, the course explains the COBIT framework and supporting materials in a logical and example-driven approach.","pageId":"cobit-5-assessor","countOfLearner":10000,"ratingCount":2000,"categoryName":"Business And Process Framework Training And Certification","productVideoLink":"https://www.youtube.com/embed/pgYP6ykVmvY","mode":"Online","catID":"it-governance","courseName":"COBIT5Ū Assessor Certification Training Course","courseImage":"cobit-5.png","common":true,"courseImagePath":"images/","countryCode":"ALL","averageRating":3.5,"courseStartsOn":"03/03/2018","pageURL":"/it-governance/cobit-5-assessor","id":null,"batchType":"WeekEnd","isFavourite":null},{"courseDuratoin":null,"subCategory":"Project Management","courseRating":4,"courseSummary":"An ideal entry level CAPMŪ certification, that is been specially designed for project practitioners. The CAPMŪ Exam Prep course layout is being charted in such a way to make participants comfortable and confident by demonstrating and illustrating the integrated approach to project management as described in A Guide to the Project Management Body of Knowledge (PMBOKŪ Guide) . The CAPMŪ Certification program also discusses the best practices and action plan needed to manage projects effectively. All-inclusive sections which include sample questions on each knowledge area and planning processes are covered. CAPMŪ Boot Camp covers, assignments, homework and plan for post course studies for CAPMŪ. A prerequisite for a CAPMŪ Certification aspirant is that the candidate should have a minimum of 23 hours of project management experience.","pageId":"capm-certification-training","countOfLearner":12000,"ratingCount":2400,"categoryName":"Business And Process Framework Training And Certification","productVideoLink":"https://www.youtube.com/embed/pgYP6ykVmvY","mode":"ClassRoom","catID":"project-management","courseName":"CAPMŪ Certification Study Facilitation Program","courseImage":"capm-certification.png","common":true,"courseImagePath":"images/","countryCode":null,"averageRating":4.5,"courseStartsOn":"","pageURL":"/project-management/capm-certification-training","id":null,"batchType":"WeekEnd","isFavourite":null}],"totalCount":null}
[{"courseDuratoin":null,"subCategory":"Quality and Process Training","courseRating":4,"courseSummary":"The Lean Six Sigma Black Belt program is a continuation from where the green belt syllabus reached its conclusion. It should be noted that you are eligible for this course only if you have successfully completed the Six Sigma Green belt. Studying for Lean Six Sigma Certification will enable an improved analytical thinking, strengthen creative problem solving and devise strategic thinking. The 6 Sigma training is a combination of Lecture, Class exercise, Case studies, Team Exercise and a problem-solving approach. Participants will need to complete a Demo Project, which they will have to solve, document and submit in the classroom. On successful submission of project, they are eligible to appear for Six Sigma Black Belt Examination. On clearing of the exam, they will receive \u201cTrained Six Sigma Black Belt\u201d Certificate. Within 3 months of clearing Six Sigma Master Black Belt exam, participants will have to submit their presentations of a real time Six Sigma Project Implementation in their process or organization. On approval of the same, participants will receive \u201cCertified Six Sigma Black Belt\u201d Certificate.","pageId":"six-sigma-black-belt","countOfLearner":14000,"ratingCount":2800,"categoryName":"Business And Process Framework Training And Certification","productVideoLink":"https://www.youtube.com/embed/pgYP6ykVmvY","mode":"ClassRoom","catID":"quality-and-process-training","courseName":"Six Sigma Black Belt Training and Certification","courseImage":"six-sigma-black-belt-certification.png","common":true,"courseImagePath":"images/","countryCode":null,"averageRating":4,"courseStartsOn":"","pageURL":"/quality-and-process-training/six-sigma-black-belt","id":null,"batchType":"WeekDay","isFavourite":null},{"courseDuratoin":null,"subCategory":"IT GOVERNANCE","courseRating":4,"courseSummary":"The COBIT 5 Assessor course confirms you have sufficient knowledge and understanding of the Assessor. Cobit 5 Framework provides a basis for measuring an organization\u2019s process capabilities against the COBIT 5 Process Assessment Model (PAM). The course is covered over 2 days and shows you the business end-to-end. This helps you effectively govern and manage organization IT. Developed for anyone interested in obtaining Assessor-level knowledge of COBIT, the course explains the COBIT framework and supporting materials in a logical and example-driven approach.","pageId":"cobit-5-assessor","countOfLearner":10000,"ratingCount":2000,"categoryName":"Business And Process Framework Training And Certification","productVideoLink":"https://www.youtube.com/embed/pgYP6ykVmvY","mode":"Online","catID":"it-governance","courseName":"COBIT5Ū Assessor Certification Training Course","courseImage":"cobit-5.png","common":true,"courseImagePath":"images/","countryCode":"ALL","averageRating":3.5,"courseStartsOn":"03/03/2018","pageURL":"/it-governance/cobit-5-assessor","id":null,"batchType":"WeekEnd","isFavourite":null},{"courseDuratoin":null,"subCategory":"Project Management","courseRating":4,"courseSummary":"An ideal entry level CAPMŪ certification, that is been specially designed for project practitioners. The CAPMŪ Exam Prep course layout is being charted in such a way to make participants comfortable and confident by demonstrating and illustrating the integrated approach to project management as described in A Guide to the Project Management Body of Knowledge (PMBOKŪ Guide) . The CAPMŪ Certification program also discusses the best practices and action plan needed to manage projects effectively. All-inclusive sections which include sample questions on each knowledge area and planning processes are covered. CAPMŪ Boot Camp covers, assignments, homework and plan for post course studies for CAPMŪ. A prerequisite for a CAPMŪ Certification aspirant is that the candidate should have a minimum of 23 hours of project management experience.","pageId":"capm-certification-training","countOfLearner":12000,"ratingCount":2400,"categoryName":"Business And Process Framework Training And Certification","productVideoLink":"https://www.youtube.com/embed/pgYP6ykVmvY","mode":"ClassRoom","catID":"project-management","courseName":"CAPMŪ Certification Study Facilitation Program","courseImage":"capm-certification.png","common":true,"courseImagePath":"images/","countryCode":null,"averageRating":4.5,"courseStartsOn":"","pageURL":"/project-management/capm-certification-training","id":null,"batchType":"WeekEnd","isFavourite":null}]
{"courseDuratoin":null,"subCategory":"Quality and Process Training","courseRating":4,"courseSummary":"The Lean Six Sigma Black Belt program is a continuation from where the green belt syllabus reached its conclusion. It should be noted that you are eligible for this course only if you have successfully completed the Six Sigma Green belt. Studying for Lean Six Sigma Certification will enable an improved analytical thinking, strengthen creative problem solving and devise strategic thinking. The 6 Sigma training is a combination of Lecture, Class exercise, Case studies, Team Exercise and a problem-solving approach. Participants will need to complete a Demo Project, which they will have to solve, document and submit in the classroom. On successful submission of project, they are eligible to appear for Six Sigma Black Belt Examination. On clearing of the exam, they will receive \u201cTrained Six Sigma Black Belt\u201d Certificate. Within 3 months of clearing Six Sigma Master Black Belt exam, participants will have to submit their presentations of a real time Six Sigma Project Implementation in their process or organization. On approval of the same, participants will receive \u201cCertified Six Sigma Black Belt\u201d Certificate.","pageId":"six-sigma-black-belt","countOfLearner":14000,"ratingCount":2800,"categoryName":"Business And Process Framework Training And Certification","productVideoLink":"https://www.youtube.com/embed/pgYP6ykVmvY","mode":"ClassRoom","catID":"quality-and-process-training","courseName":"Six Sigma Black Belt Training and Certification","courseImage":"six-sigma-black-belt-certification.png","common":true,"courseImagePath":"images/","countryCode":null,"averageRating":4,"courseStartsOn":"","pageURL":"/quality-and-process-training/six-sigma-black-belt","id":null,"batchType":"WeekDay","isFavourite":null}
Quality and Process Training
4
The Lean Six Sigma Black Belt program is a continuation from where the green belt syllabus reached its conclusion. It should be noted that you are eligible for this course only if you have successfully completed the Six Sigma Green belt. Studying for Lean Six Sigma Certification will enable an improved analytical thinking, strengthen creative problem solving and devise strategic thinking. The 6 Sigma training is a combination of Lecture, Class exercise, Case studies, Team Exercise and a problem-solving approach. Participants will need to complete a Demo Project, which they will have to solve, document and submit in the classroom. On successful submission of project, they are eligible to appear for Six Sigma Black Belt Examination. On clearing of the exam, they will receive ?Trained Six Sigma Black Belt? Certificate. Within 3 months of clearing Six Sigma Master Black Belt exam, participants will have to submit their presentations of a real time Six Sigma Project Implementation in their process or organization. On approval of the same, participants will receive ?Certified Six Sigma Black Belt? Certificate.
six-sigma-black-belt
14000
2800
Business And Process Framework Training And Certification
ClassRoom
quality-and-process-training

Six Sigma Black Belt Training and Certification

Six Sigma Black Belt Training and Certification

six-sigma-black-belt-certification.png
true
images/
4
WeekDay
{"courseDuratoin":null,"subCategory":"IT GOVERNANCE","courseRating":4,"courseSummary":"The COBIT 5 Assessor course confirms you have sufficient knowledge and understanding of the Assessor. Cobit 5 Framework provides a basis for measuring an organization\u2019s process capabilities against the COBIT 5 Process Assessment Model (PAM). The course is covered over 2 days and shows you the business end-to-end. This helps you effectively govern and manage organization IT. Developed for anyone interested in obtaining Assessor-level knowledge of COBIT, the course explains the COBIT framework and supporting materials in a logical and example-driven approach.","pageId":"cobit-5-assessor","countOfLearner":10000,"ratingCount":2000,"categoryName":"Business And Process Framework Training And Certification","productVideoLink":"https://www.youtube.com/embed/pgYP6ykVmvY","mode":"Online","catID":"it-governance","courseName":"COBIT5Ū Assessor Certification Training Course","courseImage":"cobit-5.png","common":true,"courseImagePath":"images/","countryCode":"ALL","averageRating":3.5,"courseStartsOn":"03/03/2018","pageURL":"/it-governance/cobit-5-assessor","id":null,"batchType":"WeekEnd","isFavourite":null}
IT GOVERNANCE
4
The COBIT 5 Assessor course confirms you have sufficient knowledge and understanding of the Assessor. Cobit 5 Framework provides a basis for measuring an organization?s process capabilities against the COBIT 5 Process Assessment Model (PAM). The course is covered over 2 days and shows you the business end-to-end. This helps you effectively govern and manage organization IT. Developed for anyone interested in obtaining Assessor-level knowledge of COBIT, the course explains the COBIT framework and supporting materials in a logical and example-driven approach.
cobit-5-assessor
10000
2000
Business And Process Framework Training And Certification
Online
it-governance

COBIT5Ū Assessor Certification Training Course

COBIT5Ū Assessor Certification Training Course

cobit-5.png
true
images/
ALL
3.5
03/03/2018
WeekEnd
{"courseDuratoin":null,"subCategory":"Project Management","courseRating":4,"courseSummary":"An ideal entry level CAPMŪ certification, that is been specially designed for project practitioners. The CAPMŪ Exam Prep course layout is being charted in such a way to make participants comfortable and confident by demonstrating and illustrating the integrated approach to project management as described in A Guide to the Project Management Body of Knowledge (PMBOKŪ Guide) . The CAPMŪ Certification program also discusses the best practices and action plan needed to manage projects effectively. All-inclusive sections which include sample questions on each knowledge area and planning processes are covered. CAPMŪ Boot Camp covers, assignments, homework and plan for post course studies for CAPMŪ. A prerequisite for a CAPMŪ Certification aspirant is that the candidate should have a minimum of 23 hours of project management experience.","pageId":"capm-certification-training","countOfLearner":12000,"ratingCount":2400,"categoryName":"Business And Process Framework Training And Certification","productVideoLink":"https://www.youtube.com/embed/pgYP6ykVmvY","mode":"ClassRoom","catID":"project-management","courseName":"CAPMŪ Certification Study Facilitation Program","courseImage":"capm-certification.png","common":true,"courseImagePath":"images/","countryCode":null,"averageRating":4.5,"courseStartsOn":"","pageURL":"/project-management/capm-certification-training","id":null,"batchType":"WeekEnd","isFavourite":null}
Project Management
4
An ideal entry level CAPMŪ certification, that is been specially designed for project practitioners. The CAPMŪ Exam Prep course layout is being charted in such a way to make participants comfortable and confident by demonstrating and illustrating the integrated approach to project management as described in A Guide to the Project Management Body of Knowledge (PMBOKŪ Guide) . The CAPMŪ Certification program also discusses the best practices and action plan needed to manage projects effectively. All-inclusive sections which include sample questions on each knowledge area and planning processes are covered. CAPMŪ Boot Camp covers, assignments, homework and plan for post course studies for CAPMŪ. A prerequisite for a CAPMŪ Certification aspirant is that the candidate should have a minimum of 23 hours of project management experience.
capm-certification-training
12000
2400
Business And Process Framework Training And Certification
ClassRoom
project-management

CAPMŪ Certification Study Facilitation Program

CAPMŪ Certification Study Facilitation Program

capm-certification.png
true
images/
4.5
WeekEnd