Organization of Information Technology (IT) at the Enterprise

Major: Cybersecurity
Code of subject: 6.125.04.E.165
Credits: 5.00
Department: Information Security
Lecturer: Senior Lecturer Marta Stakhiv
Semester: 5 семестр
Mode of study: денна
Learning outcomes: Learning results: 1. IT strategy and IT architecture of the enterprise; 2. typical ITSM (Information Technology Service Management) processes; 3. basic approaches to software licensing; 4. a list of Internet technologies that can be used at the enterprise; 5. approaches to building network marketing and electronic commerce systems. Program learning results: KN 1. Knowledge and understanding of the scientific principles underlying cyber security and information technologies; KN 2. Mastering the methods of general scientific analysis in the field of information technologies and information security; KN 3. Be able to evaluate the compliance of the information protection system of the automated system with its purpose in accordance with the requirements of current standards; KN 4. Systematically think and apply creative abilities to the formation of fundamentally new ideas in the field of information security; KN 5. Identify, classify and describe work in the field of information protection. KN 4.1. Solve the task of protecting programs and information processed in information and telecommunication systems by means of hardware and software and evaluate the effectiveness of the quality of the decisions made. KN 4.2. Implement measures and ensure the implementation of processes of prevention of unauthorized access and protection in information and information and telecommunication (automated) systems based on the reference model of interaction of open systems. KN 4.4. Analyze and evaluate the effectiveness and level of security of resources of different classes in information and information and telecommunication (automated) systems during tests in accordance with the established information and/or cyber security policy KN 4.7. Apply protection theories and methods to ensure the security of elements of information and telecommunication systems. KN 4.9. To solve the problems of ensuring the continuity of business processes of the organization on the basis of risk theory. KN 4.11. Solve problems of software code analysis for the presence of possible threats
Required prior and related subjects: IS risk assessment and recovery planning Information security audit
Summary of the subject: Introduction. The concept of information technology. Information technology in various fields of human activity. The role of IT in business. The concept of IT strategy and IT architecture of the enterprise or organization. Service life cycle. SERVICE STRATEGY - Building a strategy as a stage of the service life cycle. Functions and processes in the service life cycle. Process: DEMAND MANAGEMENT - Demand management. Fundamentals of planning. Four "P" Building Strategies. Determining the capabilities and value of the service. Process: SERVICE PORTFOLIO MANAGEMENT - Service portfolio management. Process: FINANCIAL MANAGEMENT - financial management. Return on investment - ROI SERVICE DESIGN - Design of services as a stage of the life cycle. Basic aspects of design. Further actions in the framework of service design. Models for designing and providing services Process: SERVICE CATALOG MANAGEMENT - Service catalog management. Process: SERVICE LEVEL MANAGEMENT - Service level management. Process: CAPACITY MANAGEMENT - Capacity Management. Process: AVAILABILITY MANAGEMENT - Availability Management. Process: IT SERVICE CONTINUITY MANAGEMENT - Service continuity management. Process: INFORMATION SECURITY MANAGEMENT - Information Security Management. Process: SUPPLIER MANAGEMENT - Supplier Management SERVICE TRANSITION - Transformation (implementation) as a stage of the service life cycle. Basic principles of the transformation stage. Transformation planning and support. Process: CHANGE MANAGEMENT - Change Management. Process: SERVICE ASSET AND CONFIGURATION MANAGEMENT - Asset and configuration management Process: RELEASE AND DEPLOYMENT MANAGEMENT - Release and Deployment Management as part of Service Transformation Process: SERVICE VALIDATION AND TESTING - Confirmation and testing of services. Process: CHANGE EVALUATION - Evaluation of changes. Process: KNOWLEDGE MANAGEMENT - Knowledge Management SERVICE OPERATIONS - Operation of services as a stage of the life cycle of services. Process: EVENT MANAGEMENT - Event management. Process: INCIDENT MANAGEMENT - Incident management. Function: Service Desk - technical support Process: REQUEST FULFILLMENT - Manage service requests. Process: PROBLEM MANAGEMENT - Problem management. Process: ACCESS MANAGEMENT - Access control. Relationship of operational processes with other stages of the life cycle. Change management CONTINUAL SERVICE IMPROVEMENT - Continuous improvement of services as a stage of the service life cycle. Basic principles of continuous improvement of services. 7-step improvement process. Reporting. Measurement of services. ROI for continuous service improvement. Business issues to CSI. Service Level Management (SLM) and CSI
Assessment methods and criteria: Current control - 40 points Exam (with oral component) - 60 points
Recommended books: 1. ITIL Foundation / Stationery Office (Great Britain), Alexos Stationery Office, 2019 (ISBN 0113316070, 9780113316076), - 209 ст. 2. ITIL® Foundation Handbook PDF (Pocketbook from the Official Publisher of ITIL) itSMF UK / TSO (The Stationery Office), - 243 ст. 3. ITIL® V3 Foundation Exam - The Study Guide Editors (Inform-IT): Jan van Bon (Managing editor) / Van Haren Publishing, Zaltbommel, - 245 ст. 1. ITIL For Dummies Paperback / For Dummies; 2011 edition (April 23, 2012), - 392 ст. 2. ITIL For Beginners: The Complete Beginner's Guide To ITIL 2nd Edition / TSO (The Stationery Office), - 158 ст. 3. ITSM: QuickStart Guide - The Simplified Beginner's Guide To IT Service Management 1st EditionPaperback / ClydeBank Media LLC; 1 edition (May 19, 2016), - 110 ст.