From the course: Putting ITIL® Into Practice: Applying ITIL® 3 Foundation Concepts
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
A hunting we shall go - ITIL Tutorial
From the course: Putting ITIL® Into Practice: Applying ITIL® 3 Foundation Concepts
A hunting we shall go
- [Instructor] A great way to start getting to a shared understanding of terminology is to gather the artifacts associated with each. For example, can you locate a business case template that your team and organization uses and an example of a good one? How about the same for SLAs, OLAs, UCs, and service design packaging? It'll be very telling if you can or cannot readily access these things in your team and organization. Further, it'll be telling if they vary a great deal from what ITIL suggests. Not that that is bad or good. But you should understand how your practices and artifacts vary from those of ITIL and be on the lookout for irrational variations and unnecessary complexity. For this situation, let's apply the sixth way, lower transaction costs. Here's how. For each of the terms in the proceeding list covered in your foundation course, see if you can locate the artifact in your organization. Mark the list with dots to indicate their status. For example, unknown, missing…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
Applying ITIL doesn't have to be this way2m 12s
-
(Locked)
The Seven Ways: Service management applications2m 17s
-
(Locked)
The Seven Ways: A service management manifesto5m 52s
-
(Locked)
Enact and enable outcomes8m 26s
-
(Locked)
Enlighten and empower people3m 32s
-
(Locked)
Lower barriers, increase enablers1m 51s
-
(Locked)
Improve moments of truth3m 10s
-
(Locked)
Bringing the first four ways together1m 1s
-
(Locked)
Root out variation and dependency5m 16s
-
(Locked)
Lower transaction costs2m 23s
-
(Locked)
Reflect and act as individuals, teams, and organizations3m 38s
-
(Locked)
Now that we've covered our approach, let's start applying1m 3s
-
-
-
Services and service management2m 19s
-
(Locked)
Service management lifecycle1m 31s
-
(Locked)
Service management terminology1m 14s
-
(Locked)
Service management processes1m 26s
-
(Locked)
Service management functions1m 31s
-
(Locked)
Service management roles1m 23s
-
(Locked)
Service management technology and architecture1m 45s
-
-
-
(Locked)
Services and stakeholders1m 39s
-
(Locked)
Services and business services1m
-
(Locked)
Value perception and stakeholder relations1m 20s
-
(Locked)
Hiding the specifics of costs and risks1m 39s
-
(Locked)
Internal and external services, customers, and users1m 43s
-
(Locked)
Core, enabling, option, and enhancing services1m 5s
-
(Locked)
Service assets1m 5s
-
(Locked)
Service parts1m 24s
-
(Locked)
Service features, qualities, and telemetry1m 37s
-
(Locked)
Service management capabilities1m 30s
-
(Locked)
Service portfolio1m 18s
-
(Locked)
Service catalog1m 12s
-
(Locked)
Utility and warranty = Value1m 19s
-
(Locked)
Variation, dependencies, and service degradation50s
-
(Locked)
SLAs, OLAs, and UCs1m 43s
-
(Locked)
-
-
(Locked)
Why shared terminology is important1m 45s
-
(Locked)
Service management terminology and key principles and models2m 4s
-
(Locked)
Overall and next-level-down understanding1m 31s
-
(Locked)
A hunting we shall go1m 7s
-
(Locked)
Do something with it1m 6s
-
(Locked)
Where does it hurt?1m 2s
-
(Locked)
Key principles and models50s
-
(Locked)
Value creation through services1m 15s
-
(Locked)
People, process, products, and partners1m 58s
-
(Locked)
Five aspects of service design1m 4s
-
(Locked)
CSI approach53s
-
(Locked)
CSFs and KPIs1m 8s
-
(Locked)
Baselines52s
-
(Locked)
Technology, process, and service metrics1m 7s
-
(Locked)