This curriculum spans the breadth of a multi-workshop organizational rollout, addressing the same granular decision-making and cross-functional trade-offs encountered in real-world ITSM implementations across service design, tool integration, governance, and operational handoffs.
Module 1: Defining and Aligning ITSM Scope with Business Objectives
- Selecting which business units or services will be included in the initial ITSM rollout based on operational criticality and stakeholder influence.
- Negotiating service definitions with department heads who have conflicting interpretations of service ownership and accountability.
- Deciding whether to adopt a centralized, decentralized, or hybrid service desk model based on existing organizational structure.
- Mapping legacy support processes to ITIL practices without disrupting ongoing operations or violating compliance requirements.
- Establishing criteria for excluding certain functions (e.g., development teams) from formal incident management workflows.
- Resolving disagreements between IT and business leaders over what constitutes a "major incident" requiring escalation.
Module 2: Tool Selection and Integration Architecture
- Evaluating whether to extend an existing ticketing system or implement a new ITSM platform based on integration capabilities and total cost of ownership.
- Designing data synchronization between the ITSM tool and CMDB when authoritative sources are distributed across Active Directory, cloud providers, and on-prem databases.
- Deciding which third-party tools (e.g., monitoring, identity management) require real-time integration versus batch synchronization.
- Handling API rate limits from cloud vendors when populating configuration items at scale.
- Choosing between native vendor connectors and custom middleware for integrating legacy applications with the ITSM platform.
- Implementing role-based access controls in the ITSM tool that mirror existing IAM policies without creating administrative overhead.
Module 3: Configuration Management Database (CMDB) Governance
- Defining ownership responsibilities for CI data accuracy across infrastructure, network, and application teams with overlapping responsibilities.
- Establishing reconciliation rules when discovery tools report conflicting information about the same server or service.
- Determining the refresh frequency for CI data based on change velocity and performance impact on discovery tools.
- Deciding which CIs require manual validation versus automated population based on compliance or audit requirements.
- Handling decommissioned assets that remain in monitoring systems but should be retired from the CMDB.
- Resolving disputes between teams over naming conventions and classification hierarchies for applications and services.
Module 4: Incident and Problem Management Workflow Design
- Setting thresholds for auto-escalation of incidents based on historical resolution times and business impact patterns.
- Designing escalation paths that account for global on-call rotations and time zone differences without creating alert fatigue.
- Defining when an incident should trigger a formal problem record versus being resolved as a known error.
- Integrating post-mortem findings into the knowledge base without exposing sensitive root cause details to frontline support.
- Implementing SLA calculations that exclude scheduled maintenance windows and account for business hours by region.
- Managing duplicate tickets created when users report the same outage through multiple channels.
Module 5: Change Enablement and Risk Assessment
- Classifying changes as standard, normal, or emergency based on organizational risk appetite and past failure rates.
- Designing CAB meeting frequency and membership to include stakeholders without creating change approval bottlenecks.
- Implementing automated risk scoring for changes based on CI criticality, change type, and requester history.
- Handling emergency changes that bypass CAB review while ensuring audit trail completeness.
- Defining rollback criteria and success metrics for high-risk changes in production environments.
- Reconciling change records with deployment tools (e.g., Jenkins, Azure DevOps) when deployments occur outside the change window.
Module 6: Service Level Management and Performance Reporting
- Selecting KPIs for service level agreements that reflect actual business impact rather than technical convenience.
- Handling SLA breaches caused by third-party vendors with limited contractual recourse or visibility.
- Designing reports that differentiate between provider performance and customer-induced delays in request fulfillment.
- Adjusting service targets after organizational mergers when legacy SLAs conflict in scope and rigor.
- Managing stakeholder expectations when service performance improves but user satisfaction remains low due to communication gaps.
- Archiving historical SLA data in compliance with data retention policies while maintaining reporting continuity.
Module 7: Organizational Change Management and Role Definition
- Redesigning job descriptions and performance metrics to align with new ITSM responsibilities without creating role duplication.
- Resolving resistance from senior engineers who view service request handling as beneath their skill level.
- Training Level 1 support staff to categorize incidents accurately without over-relying on escalation.
- Implementing accountability for process adherence when multiple teams share responsibility for a single workflow.
- Managing turnover in process owner roles that leads to inconsistent enforcement of ITSM policies.
- Integrating contractor and temporary staff into ITSM workflows while maintaining security and compliance boundaries.
Module 8: Continuous Improvement and Metrics-Driven Optimization
- Selecting baseline metrics for process maturity assessment without overwhelming teams with data collection demands.
- Identifying process bottlenecks using ticket aging reports while accounting for seasonal workload variations.
- Deciding whether to retire underutilized processes (e.g., request fulfillment for deprecated services) or maintain them for compliance.
- Conducting process reviews that produce actionable improvements rather than reiterating known issues.
- Aligning CSI initiatives with budget cycles and competing infrastructure modernization projects.
- Measuring the effectiveness of knowledge base articles by tracking reuse rates and resolution time impact.