Skip to main content

IT Service Delivery in ITSM

$249.00
How you learn:
Self-paced • Lifetime updates
Toolkit Included:
Includes a practical, ready-to-use toolkit containing implementation templates, worksheets, checklists, and decision-support materials used to accelerate real-world application and reduce setup time.
Your guarantee:
30-day money-back guarantee — no questions asked
Who trusts this:
Trusted by professionals in 160+ countries
When you get access:
Course access is prepared after purchase and delivered via email
Adding to cart… The item has been added

This curriculum spans the full lifecycle of IT service delivery, comparable in scope to a multi-workshop organizational transformation program, addressing strategic planning, cross-functional coordination, and operational execution across service management functions.

Module 1: Service Strategy and Portfolio Management

  • Defining service portfolio boundaries by evaluating which internal capabilities should be formalized as chargeable services versus operational overhead.
  • Aligning service investment decisions with business unit roadmaps during annual planning cycles, including justifying decommissioning underutilized services.
  • Establishing service valuation models for internal billing, including cost attribution for shared infrastructure components like identity management and monitoring.
  • Conducting demand forecasting for new services using historical usage patterns and business growth projections to size required capacity.
  • Implementing governance for service retirement, including data archival, access revocation, and stakeholder notification protocols.
  • Resolving conflicts between business units over shared service funding models when usage and benefit distribution are uneven.

Module 2: Service Design and SLA Architecture

  • Negotiating SLA terms with legal and procurement teams to ensure enforceability while maintaining operational feasibility under peak load.
  • Designing service-specific KPIs that reflect actual user experience, such as application response time at the client layer, not just server uptime.
  • Integrating security and compliance requirements into service blueprints, including audit trail retention and access logging standards.
  • Specifying failover and recovery procedures in service design documents that align with RTO/RPO agreed upon with business owners.
  • Coordinating cross-functional design reviews involving network, security, and application teams to prevent implementation gaps.
  • Documenting exception handling processes for SLA breaches, including escalation paths and root cause analysis timelines.

Module 3: Service Transition and Change Control

  • Classifying changes using risk-based criteria to determine whether CAB review is required or if standard change procedures apply.
  • Managing emergency change backlogs by scheduling post-implementation reviews to prevent recurrence of unapproved modifications.
  • Enforcing build integrity through automated configuration validation before promoting changes to production environments.
  • Coordinating parallel testing windows with business units to validate service functionality without disrupting live operations.
  • Handling rollback planning for high-risk deployments, including data state restoration and configuration reversion scripts.
  • Resolving conflicts between development timelines and change advisory board schedules during peak release periods.

Module 4: Incident Management and Major Event Response

  • Defining incident categorization rules that enable accurate trend analysis without creating excessive classification overhead.
  • Implementing escalation procedures for major incidents, including notifying executive stakeholders within defined time thresholds.
  • Integrating monitoring alerts with incident management systems to reduce mean time to acknowledge while minimizing alert fatigue.
  • Conducting post-incident reviews that focus on process gaps, not individual blame, with documented action items and owners.
  • Managing incident communication across geographically distributed teams using standardized status update templates.
  • Balancing automation of incident routing with the need for human judgment in complex, multi-system outages.

Module 5: Problem Management and Root Cause Analysis

  • Selecting which recurring incidents to escalate to problem records based on business impact and frequency thresholds.
  • Applying root cause analysis techniques such as fishbone diagrams or 5 Whys in cross-functional workshops with technical teams.
  • Tracking known error database (KEDB) accuracy by auditing workaround effectiveness and linking to resolved incidents.
  • Coordinating permanent fix implementation with change management, especially when fixes require third-party vendor involvement.
  • Measuring problem management ROI by tracking reduction in incident volume after permanent fixes are deployed.
  • Resolving ownership disputes for problems that span multiple technical domains, such as network, application, and database layers.

Module 6: Service Operation and Request Fulfillment

  • Designing service request workflows that balance user convenience with compliance, including approval chains for privileged access.
  • Automating fulfillment of common requests such as password resets and software installations using runbook automation tools.
  • Managing catalog versioning when updating service offerings to prevent disruption to users with active requests.
  • Enforcing request prioritization rules that align with business criticality, not just requester seniority.
  • Integrating service catalog with identity management systems to ensure provisioning reflects current role-based access policies.
  • Auditing fulfilled requests quarterly to detect policy violations or unauthorized entitlement accumulation.

Module 7: Continual Service Improvement and Performance Measurement

  • Selecting CSI initiatives based on service performance data, customer feedback, and resource availability trade-offs.
  • Establishing baseline metrics for services before launching improvement projects to measure actual impact.
  • Conducting service reviews with business stakeholders using standardized reporting templates focused on SLA adherence and incident trends.
  • Implementing feedback loops from support teams into design and transition processes to address recurring operational pain points.
  • Using balanced scorecards to evaluate ITSM performance across dimensions: quality, cost, agility, and user satisfaction.
  • Managing resistance to process changes by involving frontline staff in improvement workshops and pilot testing.

Module 8: Governance, Compliance, and Audit Readiness

  • Mapping ITSM processes to regulatory requirements such as SOX, HIPAA, or GDPR for audit evidence collection.
  • Configuring access controls in the ITSM tool to enforce segregation of duties between incident, change, and problem roles.
  • Maintaining audit trails for all service management activities, including change approvals and incident updates, for minimum retention periods.
  • Preparing for internal and external audits by organizing evidence packs for key processes and control points.
  • Responding to audit findings by implementing corrective actions with verifiable completion dates and validation steps.
  • Reconciling policy documentation with actual practice during control assessments to avoid compliance gaps due to process drift.