×
Phoenix TS

Information Technology Asset Management (ITAM) Training

BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!

Course Overview

Phoenix TS’ (3) three day Information Technology Asset Management training in Washington DC Metro and Live Online is a practical, comprehensive, and authoritative guide to software and IT asset management. This course can help organizations achieve major benefits in risk management, cost reduction, enhanced security and improved service delivery. It will facilitate the integration of SAM/ITAM with service management and information security management while linking to organizational objectives.

To do this, the course gives structured and clear explanations of complex topics, with frequent real-life examples, key messages, and checklists.

Pricing

$1,950

Schedule

Currently, there are no public classes scheduled. Please contact a Phoenix TS Training Consultant to discuss hosting a private class at 301-258-8200.

[image]

Not seeing a good fit?

Let us know. Our team of instructional designers, curriculum developers, and subject matter experts can create a custom course for you.

Contact Us

Learn more about custom training

Course Objectives

  • Define software and IT asset management
  • Identify the four key areas of ITAM
  • Use ITAM best practices
  • Define information and people as assets
  • Create sound asset management policies
  • Effectively communicate their organizations ITAM goals

Course Duration

  • 3 days

Course Outline

ITAM Introduction

  • Definition, purposes and objectives
  • Why does your organization need ITAM?
  • Introduction to the four key areas:
  • Hardware Asset Management, Software Asset Management, Services & Cloud Asset Management, People & Information Asset Management
  • The IT Asset lifecycle and its impact on your business
  • The key roles in ITAM – stakeholders, functions, roles and responsibilities
  • Typical business issues and challenges in the ITAM workflow
  • Introduction to ITAM best practices, ISO55000 and ITSM

Hardware Asset Management (HAM) Introduction

  • The concept, purpose and benefits of HAM
  • The HAM lifecycle in your organization from acquisition through to disposal
  • Request and approval processes, procurement and lifecycle management, redeployment and disposal management
  • The placement of HAM in the ITAM ecosystem
  • Mobile device (asset) management aspects of HAM
  • The best practices of HAM (ISO and ITSM)
  • The tool reflections of HAM

Software Asset Management (SAM) Introduction

  • Definition and objectives
  • SAM best practices and framework
  • The business value of SAM
  • SAM from request to acquisition through to disposal
  • Key roles and stakeholders in a SAM program
  • The placement of SAM in the ITAM ecosystem
  • The concept of compliance
  • The risks/costs related to software audits
  • Organizational pitfalls and challenges in the SAM process
  • IT service Management and ISO19770 approach within SAM

Services and Cloud Asset Management Introduction

  • The concept of services and cloud services
  • The costs, challenges and benefits associated with Services and Cloud services
  • Definition and objectives within Services and Cloud Asset Management (SEAM)
  • The contractual issues with assets in SEAM
  • The pitfalls and benefits from SEAM
  • ITAM best practices in a SEAM context
  • The placement of SEAM in the ITAM ecosystem
  • Key roles and stakeholders in a SEAM program
  • Compliance in a Cloud perspective

People & Information Asset Management (PINAM) Introduction

  • Definition and objectives
  • How to define Information and People as assets
  • Security and risk control (information sharing, employees leaving the organization, loss of mobile devices, access regulations, etc)
  • BYOD in a People and Information Management perspective
  • How do mobile users use their devices and content? Benefits and pitfalls
  • Policy Setting – security policies for content, users and mobile devices
  • ITAM Key findings and Conclusions
  • The best practices in the ITAM framework
  • How to assess and understand the ITAM maturity in your organization
  • The interface between the four key ITAM areas (HAM, SAM, SEAM, PINAM)
  • Effective communication of your ITAM goals to the key stakeholders in your organization

FAQs

Who is this training for?

This course is intended for Budget Managers, IT Service Managers, Help-desk personnel, Risk Managers, and IT Operations personnel.

BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!

Phoenix TS is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints re-garding registered sponsors may be submitted to the National Registry of CPE Sponsors through its web site: www.nasbaregistry.org

Subscribe now

Get new class alerts, promotions, and blog posts

Phoenix TS needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.

Download Course Brochure

Enter your information below to download this brochure!

Name(Required)