This curriculum spans the design and governance of an enterprise ITSM function, comparable in scope to a multi-phase internal capability build, addressing strategic alignment, service operations, and integration with modern development practices across global and hybrid environments.
Module 1: Defining and Aligning ITSM Strategy with Business Objectives
- Selecting which business units to prioritize for ITSM rollout based on operational criticality and change readiness.
- Mapping core business services to underlying IT components to establish service ownership and accountability.
- Deciding whether to adopt a centralized, decentralized, or hybrid ITSM governance model across global offices.
- Establishing KPIs that reflect business outcomes rather than IT activity metrics (e.g., incident volume vs. business process uptime).
- Conducting stakeholder workshops to reconcile conflicting priorities between IT, finance, and business leaders.
- Determining the scope of initial ITSM implementation—starting with incident and request management versus full lifecycle coverage.
Module 2: Designing and Implementing Service Catalogs and Portals
- Classifying services into customer-facing, technical, and supporting categories to ensure accurate catalog structuring.
- Defining service ownership and approval workflows for catalog entry creation, updates, and retirement.
- Integrating the service portal with identity providers (e.g., Azure AD, Okta) to enable single sign-on and role-based access.
- Designing request fulfillment workflows with automated approvals based on cost thresholds or risk profiles.
- Validating service descriptions with legal and compliance teams to avoid ambiguous SLAs or regulatory exposure.
- Optimizing portal usability through iterative user testing with non-technical requesters to reduce support burden.
Module 3: Incident and Problem Management at Scale
- Implementing event correlation rules to suppress noise and prevent alert storms from monitoring tools.
- Establishing severity classification criteria that align with business impact, not just technical downtime.
- Creating dedicated war rooms and communication protocols for major incident response across time zones.
- Deciding when to escalate from incident resolution to formal problem management with root cause analysis.
- Integrating incident data with CMDB to improve diagnosis accuracy and reduce mean time to repair (MTTR).
- Enforcing post-incident review discipline, including action item tracking and follow-up validation.
Module 4: Change Enablement and Risk-Based Approval Workflows
- Categorizing changes into standard, normal, and emergency types with differentiated approval requirements.
- Implementing CAB structures—permanent vs. rotating members—based on organizational complexity and change volume.
- Configuring automated risk scoring for changes using inputs like change type, affected CIs, and maintenance window.
- Defining rollback procedures and success criteria prior to change authorization, especially for production systems.
- Managing shadow IT by detecting unauthorized changes through integration with configuration monitoring tools.
- Conducting change advisory board meetings with time-boxed agendas and documented decision rationales.
Module 5: Configuration Management and CMDB Governance
- Selecting authoritative data sources for CIs (e.g., SCCM for workstations, ServiceNow Discovery for servers).
- Defining CI ownership and stewardship roles to ensure data accuracy and timely updates.
- Establishing reconciliation processes to resolve discrepancies between discovery tools and manual records.
- Determining the depth of relationship mapping—direct dependencies only versus full impact chains.
- Implementing lifecycle states for CIs (planned, live, retired) to support asset and change management.
- Controlling CMDB access to prevent unauthorized modifications while enabling service impact analysis.
Module 6: Service Level Management and Performance Reporting
- Negotiating SLA terms with business units, including realistic uptime targets and penalty-free maintenance windows.
- Designing OLAs and UCs to align internal teams and third-party vendors with end-to-end service delivery.
- Automating SLA breach alerts with escalation paths to prevent reactive firefighting.
- Calculating and reporting on service availability using actual transaction data, not synthetic monitoring.
- Handling SLA exceptions for planned outages without undermining accountability.
- Presenting performance dashboards to executives using business-relevant metrics, not IT jargon.
Module 7: Continual Service Improvement and Metrics Utilization
- Selecting improvement initiatives based on cost-benefit analysis of pain points identified in incident and change data.
- Applying Lean or Six Sigma techniques to reduce waste in request fulfillment and incident resolution.
- Validating improvement outcomes with before-and-after metrics, not anecdotal feedback.
- Embedding CSI reviews into existing governance meetings to maintain momentum without creating overhead.
- Using customer satisfaction surveys strategically—timing, frequency, and question design—to avoid survey fatigue.
- Integrating feedback loops from support teams into CSI planning to address frontline operational bottlenecks.
Module 8: Integrating ITSM with DevOps and Agile Practices
- Aligning change management processes with CI/CD pipelines using automated change records for low-risk deployments.
- Defining service ownership models for microservices where development teams manage production behavior.
- Integrating incident response with on-call engineering rotations and alerting systems like PagerDuty.
- Adapting problem management to support blameless postmortems in DevOps cultures.
- Mapping ITSM roles (e.g., service owner) to Agile roles (e.g., product owner) for shared accountability.
- Using service modeling in ITSM tools to reflect dynamic cloud infrastructure and containerized workloads.