Академический Документы
Профессиональный Документы
Культура Документы
IT Service Management
ITIL v3 Foundation Course
…Also
• All mobile phones on ‘silent’ – phone calls
must be taken outside the class (only
urgent/emergency calls)
Full Name
• Duration: 30 minutes
• Participants in this course will gain practical skills in the following areas:
– ITIL and IT Service Management (Comprehension)
– Service Management as a practice (comprehension)
– Service Lifecycle (Comprehension)
– Key Principles and Models (Awareness)
– Generic Concepts (Awareness)
– Selected Processes (Awareness)
– Selected Roles (Awareness)
– Selected Functions (Awareness)
– Technology and Architecture (Awareness)
– ITIL Qualification Scheme (Awareness)
• Credit Value: 2
• Exam Type: Multiple choice, 40 questions
• Duration: 60 minutes
• Pass Score: 26 (65%)
• Delivery: Online or Paper based
ITIL Expert Deep knowledge of ITIL Lifecycle Track = 21 No Exam required. You
Lifecycle or capability and hours of class room accumulate 22 credits
managing across lifecycle training from either lifecycle or
modules capability track and
Capability Track= managing exams, These
30 hrs of classroom exams are complex
training multiple choice.
Managing across Passing Score is 65%
Lifecycle = 30 hrs Time: 90min
Introduction to IT Service
Management
• ITIL was developed in recognition of the fact that organizations are becoming
increasingly dependent on IT to fulfill their corporate objectives
• A growing need for IT services of a quality corresponding to the objectives of
the business, and which meet the requirements and expectations of the
customer
• In the overall lifecycle of IT products, the operations phase amounts to about
70 to 80% of the overall time and cost
• ITIL offers a common framework for all the activities of the IT department, as
part of the provision of services, based on the IT infrastructure
• ITIL presents these best practices coherently in a set of documents called the
ITIL books
• Originally produced in the late 80’s – early 90’s as a set of more than 40
volumes.
• ITIL v2 books were reduced to two core books that describe IT Service
Management Best Practice.
– Service Support
– Service Delivery
• Over the years the reliance on IT services has never been more
prevalent.
Processes Products
Partners
• ISO-8402 Definition:
“Quality is the totality of characteristics of a product or
service that bear on its ability to satisfy stated and
implied needs”
• Service Culture:
– right attitude
– behavior
– value
• Review Questions
Service Management as a
Practice
• A team or group of people and the tools they use to carry out one or more
Processes or Activities. For example the Service Desk
• Specific results – The reason a process exists is to deliver a specific result. This
result must be individually identifiable and countable. While we can count
changes, it is impossible to count how many service desks were completed.
• Review Questions
A. It is measurable
B. Delivers specific results
C. Responds to specific effects
D. A method of structuring an organization
A. It is measurable
B. Delivers specific results
C. Responds to specific effects
D. A method of structuring an organization
A. 1 and 3 only
B. All of the above
C. 2 and 4 only
D. 1, 2 and 4 only
A. 1 and 3 only
B. All of the above
C. 2 and 4 only
D. 1, 2 and 4 only
CMMI COBIT
Core Structure
• Review Questions
1. Who owns the specific costs and risks associated with providing
a service?
A. Service Provider
B. Service Level Manager
C. The Customer
D. The Finance Department
1. Who owns the specific costs and risks associated with providing
a service?
A. Service Provider
B. Service Level Manager
C. The Customer
D. The Finance Department
A. Service Design
B. Service Transition
C. Service Strategy
D. Service Operation
A. Service Design
B. Service Transition
C. Service Strategy
D. Service Operation
A. Change Management
B. Service Transition
C. Service Strategy
D. Service Design
A. Change Management
B. Service Transition
C. Service Strategy
D. Service Design
Service Strategy
• Demand Management
• Financial Management
– Retired Services
• Service Valuation: Service Valuation quantifies, in financial terms, the funding sought
by the business and IT for services delivered, based on the agreed value of those
services.
• Demand modelling: Financial demand modelling focuses on identifying the total cost
of utilization (TCU) to the customer, and predicting the financial implications of future
service demand
• Service Provisioning Optimization: SPO examines the financial inputs and constraints
of service components or delivery models to determine if alternatives should be
explored relating to how a service can be provisioned differently to make it more
competitive in terms of cost or quality
• Planning Confidence: Planning provides financial translation and qualification of
expected future demand for IT Services
• Service Investment Analysis: The objective of service investment analysis is to derive a
value indication for the total lifecycle of a service based on 1) the value received, and
2) costs incurred during the lifecycle of the service
• Accounting: uses financial management to understand services in terms of
consumption and provisioning
• Compliance: Compliance relates to the ability to demonstrate that proper and
consistent accounting methods and/or practices are being employed
• Variable Cost Dynamics: Variable Cost Dynamics (VCD) focuses on analyzing and
understanding the multitude of variables that impact service cost, how sensitive those
elements are to variability, and the related incremental value changes that result
• Budgeting
• IT Accounting
• Charging
• Incremental Budgeting:
Last year’s figures are used as the basis for the new budget. This
is then adjusted to the expected changes in activities, costs and
prices.
• Zero-based Budgeting:
This method starts with a blank piece of paper: the Zero Base.
Past experience is ignored. This requires managers to justify all
their resource needs in terms of costs in their budget
– Budget Item
– Budget Classification – Capital or Operational
– Purchase Cost
– Annual Maintenance Cost
– Spend This Year
– Budget Next Year
– Notes
– Annualized Cost
• Charging refers to all the activities needed to bill the customer for
the services provided to them.
• Cost: Price=cost
• Review Questions
A. Budgeting
B. Charging
C. Procurement
D. Pricing
A. Budgeting
B. Charging
C. Procurement
D. Pricing
A. Cost recovery
B. Activity base costing
C. 'Cost plus' pricing
D. Market rate
A. Cost recovery
B. Activity based costing
C. 'Cost plus' pricing
D. Market rate
Time Activity
Service Design
Good service design is dependent on effective and efficient use of the Four P’s of
Design:
People
Processes Products
Partners
• Out-sourcing
• In-sourcing
• Co-sourcing
• Partnership or Multi-sourcing
• The main input for this information comes from the Service
Portfolio and the business via either the Business Relationship
Management or the Service Level Management processes
– Negotiating and agreeing OLAs, and in some cases other SLAs and
agreements that underpin the SLA
– Ensuring that service reports are produced for each customer service and
that breaches of SLA targets are highlighted, investigated and actions
taken to prevent their recurrence
• Demand vs. Supply: the need to ensure that the available supply
of IT processing power matches the demands made on it by the
business, both now and in the future.
• It has 3 sub-processes:
– Business Capacity Management
– Service Capacity Management
– Component Capacity Management
• Application Sizing
• Demand Management
• Security: Concerned with the security of the services ensuring that the service
is delivered within secure parameters and that confidentiality, integrity and
availability are not compromised.
• Vital Business Function: This is used to express the business critical elements
of the business process supported by an IT service. – e.g ATM function
• Availability Management Information System (AMIS): contains all of the
measurements and information required to provide the appropriate
information to the business on service levels. The AMIS also assists in the
production of the Availability Plan
• High Availability: is a characteristic of the IT Service that minimizes or
eliminates the impact of IT component failure to the User.
• Continuous Operation: is a characteristic of the IT Service that minimizes or
eliminates the impact of planned downtime to the User.
• Continuous Availability: is a characteristic of the IT Service that minimizes or
eliminate the impact of all failures and planned downtime to the User.
Copyright 2009 Turnkey Business Solutions Ltd. All Rights Reserved
The Availability Management Process
237
Copyright 2009 Turnkey Business Solutions Ltd. All Rights Reserved
Availability Management Processes
– Recover IT Service and Technology within required and agreed time scales
to support the overall Business Continuity process.
• Implementation
• Operational Management
• Security Policy
• Security Controls:
• ISM raise awareness of the need for security within all IT services
and assets throughout the organization, ensuring that the policy
is appropriate for the needs of the organization
• Review Questions
Service Transition
• Respond to the business and IT request for change that will align
the services with the business needs.
• Change Manager
The Change Manager coordinates the day-to-day responsibilities of the entire change
process. He is responsible for filtering, accepting and classifying all Requests For
Change (RFC). The change Manager chairs the CAB
• Lack of support from the CAB and/or CAB/EC when handling large volumes of
changes.
• Lack of control over the volume of emergency Changes and the level of
influence Change Management have over this volume in the future.
• Paper-based systems are too difficult to use and will present too many
problems.
• The relationship between CIs are useful for diagnosing errors and
predicting the availability of services. There are two types of
relationship
• Physical relationship:
- Forms part of: this is the parent/child relationship of the CI, e.g. a floppy disk drive forms part
of a PC, and a software module forms part of a program.
- Is connected to: e.g. a PC connected to a LAN segment.
- Is needed for: e.g. hardware needed to run an application.
• Logical relationship:
- Is a copy of: copy of a standard model, baseline or program.
- Relates to: a procedure, manuals and documentation, a SLA, or customer area.
- Is used by: e.g. a CI needed for providing a service, or a software module which is called by a
number of programs.
• Interface CIs: that are required to deliver the end-to-end service across a
service provider interface
• The DML stores all authorized versions of all Software CIs. It will
comprise of a logical filestore for developed software and a
secure physical store holding purchased software
• Configuration Analyst:
– Proposes the scope of the Asset and Configuration Management process,
functions, the items that are to be controlled, and the information that is to be
recorded; develops Asset and Configuration Management standards, plans and
procedures
– Performs configuration audits to check that the physical IT inventory is consistent
with the asset and CMS and initiates necessary corrective action
– Creates and populates project libraries and CM system; checks items and group of
items into the CM tools
– Accepts baseline products from third parties and distributes products
– Builds system baselines for promotion and release
– Maintains project status information and status accounting and reports
Copyright 2009 Turnkey Business Solutions Ltd. All Rights Reserved
SACM and Change Mgmt Roles and
Responsibilities (cont’d)
• Configuration Administrator / Librarian: is the custodian and
guardian of all master copies of software assets as
documentation CIs registered with Asset and Configuration
Management
• CMS/Tools Administrator: Evaluates proprietary Asset and
Configuration Management tools and recommends those that
best meet organizations budget, resource, timescale and
technical requirements
• Configuration Control Board: ensures that the overreaching
intention and policies of CM are employed throughout the
Service Management lifecycle
• Roll-out: To deliver, install and commission new or changed CI's across the
Organization
• Major releases: major rollout of new hardware and software, generally with
significantly increased functionality.
• Minor software releases and hardware upgrades: these generally include a
number of minor improvements and fixes of known errors..
• Emergency fixes: normally implemented as a quick fix for a problem or known
error
Copyright 2009 Turnkey Business Solutions Ltd. All Rights Reserved
Release Design Options and
Consideration
• Big Bang Vs Phased:
– Big Bang Option: new or changed service is deployed to all users in one
operation
– Phased approach: initial release to some users, then phased or roll-out to
other segments of the user community
• Push or Pull:
– Push approach: used where the service component is deployed from the
centre and pushed out to the target locations. Big band phased approach
are considered push, since the new or changed service is delivered to
users not by their choice
– Pull approach: is used for software releases where the software is made
available in a central location but users are free to pull the software down
to their location – e.g. anti-virus update
Copyright 2009 Turnkey Business Solutions Ltd. All Rights Reserved
Release Design Options and
Consideration
• Automation vs Manual
Release Build and Packaging Manager interfaces with other functions such as:
– Security Management
– Test Management
– Change as SACM
– Capacity Management
– Availability Management
– Incident Management
– Quality Management
Copyright 2009 Turnkey Business Solutions Ltd. All Rights Reserved
Roles and Responsibilities
• Deployment Staff:
– Deals with the final physical delivery of the service implementation
– Coordinates release documentation and communication, including training
and customer, Service Management and technical release notes
– Plans the deployment in conjunction with change and knowledge
Management and SACM
– Provides technical and application guidance and support through out the
release
– Provides feedback on the effectiveness of the release
– Records metrics for deployment to ensure within agreed SLAs
• Validates that a service is “fit for purpose” – it will deliver the required
performance with the desired constraint removed
• Confirms that the customer and stakeholder requirements for the new
or changed service are correctly defined and remedy any errors or
variances early in the service lifecycle as this is considerable cheaper
than fixing errors in production
• The key value to the business and customers from Service Testing
and Validation is in terms of the established degree of confidence
that a new or changes service will deliver the value and
outcomes required of it and understanding of the risks
• Ensures staff have a clear and common understanding of the value that their
services provide to customers and the ways in which benefits are realized
from the use of those services
• Ensures that, at a given time and location, the Service Provider staff have
adequate information on:
– Who is currently using their services
– The current states of consumption
– Service delivery constraints
– Difficulties faced by the customer in fully realizing the benefits expected from the
service
DIKW – a way of understanding the relationships btw data, information knowledge, and wisdom.
DIKW shows how each builds on each other
• User, service desk support staff and suppliers understanding of the new
or changed service, including knowledge of errors signed off before
deployment , to facilitate their roles within that service
• Review Questions
A. A measurement of Cost
B. A function defined within Service Transition
C. The team of people responsible for implementing a release
D. The portion of a service or IT infrastructure that is normally released
together
A. A measurement of Cost
B. A function defined within Service Transition
C. The team of people responsible for implementing a release
D. The portion of a service or IT infrastructure that is normally released
together
Service Operation
• The primary aim of the Service Desk is to restore the ‘normal service’
to the users as quickly as possible
• To provide a single point of contact for the Users
• To deliver the high quality support critical for achieving business goals
• To help identify and lower the cost of ownership for IT Services as a
whole
• To support changes across distributed business, technology and process
boundaries
• To aid User retention and satisfaction
• To assist identification of business opportunities
• Receive and record all calls from users; deal directly with simple
requests and complaints.
• Provide initial assessment of all Incidents; make first attempt at
Incident resolution and/or refer to 2nd line support, based on agreed
service level
• Keep record of all requests and complaints
• Monitor and escalate all Incidents according to agreed service levels.
• Coordinate second-line and third party support activities
• Keep Users informed on status and progress
• Produce regular management reports
• Help Desk: for this type of support unit, calls are recorded, described in
general terms, and immediately routed. The Help Desk provides some levels of
support. The advantage of this approach is that incident recording is
standardized. The disadvantage is that the response time is longer and first-
call resolution rates are much lower than with a skilled Service Desk
• Service Desk: The service desk is the single point of contact between IT and
users, where they can submit enquiries, log incidents, obtain help and request
change. The principal responsibility of the service desk is to enable
communication with users and to enable actions to resolve events affecting
the use of computer systems.
Copyright 2009 Turnkey Business Solutions Ltd. All Rights Reserved
Setting up a Service Desk
The following actions need to be carried out when setting up a Service Desk:
A "Local" Service Desk will support local business needs. It should be fit for purpose and
highly in tune with what the business users need. Operating standards and processes are
required to maintain consistent quality of service.
A "Central" Service Desk supports multiple locations and sometimes multiple geographies. The
business is distributed. Centralization provides a consistent service experience. Standards are
maintained and staffing levels and expertise can be controlled easier. This usually leads to lower
overall operating costs.
A "Virtual" Service Desk operation is location independent. Sometimes Service Desk Analysts work
from home or across a number of locations. This is more common in large multi-national organizations
where multi-language assistance is required. Users feel like they are communicating locally. Standard
operating practices, processes and user experience must be upheld.
• Staff Retention: Significant loss of staff can affect the quality of service
• Customer focused
• Trained in interpersonal skills
• Articulate and methodical
• Multilingual (where necessary)
• Able to understand the business goals
• Genuinely wanting to deliver a first-class service
• Able to understand and accept that:
– The Customer’s problem affects the business
– Without the Customer, there is no support department
– The Customer is an expert in their own field
• The number of calls handled per workstation/user and the total for the
Service Desk
• Shift Leaders:
• IT Operators:
• Applications Managers/Team-leaders:
– Take overall responsibility for leadership, control and decision-making for
the applications team or department
– Provide technical knowledge and leadership in the specific applications
support activities covered department
• Applications Analyst/Architect:
– Working with users, sponsors and all other stakeholders to determine
their evolving needs
– Developing and maintaining standards for application sizing, performance
modeling, etc
– Performing cost–benefit analyses to determine the most appropriate
means to meet the stated requirement
• Event Management
• Incident Management
• Request Fulfillment
• Problem Management
• Access Management
The roles of the Service Operation functions in Event Management are as follows:
• Lines Of Support:
– First-line support (also known as tier 1 support) is normally provided by
the Service Desk.
• OLAs and UCs that are capable of influencing and shaping the correct
behaviour of all support staff.
• Problem Management will also maintain information about problems and the
appropriate workarounds and resolutions, so that the organization is able to
reduce the number and impact of incidents over time. In this respect, Problem
Management has a strong interface with Knowledge Management, and tools
such as the Known Error Database will be used for both
Known Structural
Incident Error Resolution
Error in
Problem RFC
infrastructure
• Problem Detection: can come from: monitoring tools, service desk etc.
• Problem Logging
• Problem Categorization: e.g. software, hardware, NIC failure
• Problem Prioritization: based on urgency and impact
• Investigation and Diagnostics: to try to diagnose the root cause of the
problem
• Work Around
• Raising a Known Error Record: a Known Error Record must be raised and
placed in the Known Error Database
• Problem Resolution
• Problem Closure: after resolution, the Problem Record should be formally
closed
• Major Problem Review: a review should be conducted to learn any lessons for
the future.
Copyright 2009 Turnkey Business Solutions Ltd. All Rights Reserved
Problem Management Roles
• The total number of problems recorded in the period (as a control measure)
• The percentage of problems resolved within SLA targets (and the percentage
that are not!)
• The number and percentage of problems that exceeded their target resolution
times
• The backlog of outstanding problems and the trend (static, reducing or
increasing?)
• The average cost of handling a problem
• The number of major problems (opened and closed and backlog)
• The percentage of Major Problem Reviews successfully performed
• The number of Known Errors added to the KEDB
• The percentage accuracy of the KEDB (from audits of the database)
• The percentage of Major Problem Reviews completed successfully and on
time
Copyright 2009 Turnkey Business Solutions Ltd. All Rights Reserved
Critical Success Factors
• Access: refers to the level and extent of a service’s functionality or data that a user is
entitled to use
• Identity: refers to the information about them that distinguishes them as an individual
and which verifies their status within the organization
• Rights: (also called privileges) refer to the actual settings whereby a user is provided
access to a service or group of services. Typical rights, or levels of access, include read,
write, execute, change, delete
• Directory Services: refers to a specific type of tool that is used to manage access
and rights
• The role of the Service Desk: The Service Desk is typically used as a
means to request access to a service. The Service Desk will also be
responsible for communicating with the user to ensure that they know
when access has been granted and to ensure that they receive any
other required support
– The ability to verify the identity of a user (that the person is who they say
they are)
– The ability to verify the identity of the approving person or body
– The ability to verify that a user qualifies for access to a specific service
– The ability to link multiple access rights to an individual user
– The ability to determine the status of the user at any time (e.g. to
determine whether they are still employees of the organization when they
log on to a system
– The ability to manage changes to a user’s access requirements
– The ability to restrict access rights to unauthorized users
– A database of all users and the rights that they have been granted.
• Review Questions
A. 1 only
B. 2 and 3 only
C. 1, 2 and 4 only
D. All the above
A. 1 only
B. 2 and 3 only
C. 1, 2 and 4 only
D. All the above
A. A known error for which the cause and resolution are not yet known
B. The cause of two or more incidents
C. A serious Incident which has a critical impact to the business
D. The cause of one or more Incidents
A. A known error for which the cause and resolution are not yet known
B. The cause of two or more incidents
C. A serious Incident which has a critical impact to the business
D. The cause of one or more Incidents
Time Activity
• IT must now comply with new rules and legislation and continually
demonstrate their compliance through successful independent audits by
external organizations
• Step 2 - Define what you can measure: CSI requirements can conduct
a gap analysis to identify the opportunities for improvement as well as
answering the question ‘How do we get there?’
• Process Owner: This key role is accountable for the overall quality of
the process and oversees the management of, and organizational
compliance to, the process flows, procedures, data models, policies
and technologies associated with the IT business process
• This key role is accountable for the overall quality of the process and
oversees the management of, and organizational compliance to, the
process flows, procedures, data models, policies and technologies
associated with the IT business process
• A possible event that could cause harm or loss, or affect the ability to
achieve objectives
• CSI can complement this activity and help to deliver business benefit
• Review Questions
• The same technology, with some possible additions, should be used for
the other phases of ITSM – Service Strategy, Service Design, Service
Transition and Continual Service Improvement – to give consistency
and allow an effective ITSM Lifecycle to be properly managed
• The following are some of the areas where service management can
benefit from automation:
– Design and modeling
– Service catalogue
– Pattern recognition and analysis
– Classification, prioritization and routing
– Detection and monitoring
– Optimization
• Review Questions
A. 2, 3 and 4 only
B. 1, 2 and 3 only
C. 1, 3 and 4 only
D. All of the above
A. 2, 3 and 4 only
B. 1, 2 and 3 only
C. 1, 3 and 4 only
D. All of the above
A. 1, 2 and 3 only
B. All of the above
C. 1, 3 and 4 only
D. 2, 3 and 4 only
A. 1, 2 and 3 only
B. All of the above
C. 1, 3 and 4 only
D. 2, 3 and 4 only
Incident Scenarios
A. The LAN at CWG head office is down, affecting over 100 users. The cost to the business if the
incident is not resolved in the next 2 hours is put at 2 million Naira.
B. The Director of ExpertEdge Software and Training is attempting to print his end of the week report
for submission to the Group Managing Director (GMD) of CWG, but the printer won’t work. The
GMD is currently on a tour of the company’s branch in Ghana and will not be back in three days.
C. A web application service is down and external customers of the application may not be able to
place their orders. CWG may loose 250,000 Naira per day if the service remains down.
Activity
1. Assume that all the incidents described above are happening simultaneously. Design a priority
matrix, and apply the matrix to suggest the priority of each situation.
2. Make a list of the information you would record for each and every incident. Use the scenarios
above to ensure that you have captured everything that you’ll need to resolve the incidents.
• Duration: 60 minutes