IAITAM CERTIFICATION
IAITAM International Certified IT Asset Management Training
Certified Hardware Asset Management Professional
The CHAMP course is designed to address the numerous issues plaguing professionals in managing hardware assets. The IAITAM Certified Hardware Asset Management Professional (CHAMP) Course follows the lifecycle of IT hardware assets beyond the scope of the cradle-to-grave analogy and discusses the business practices that can best be used to manage those assets efficiently and cost-effectively. Emphasis is placed on identifying the policies that enhance lifecycle management. In general, policies are only effective if developed by a cross-section of the impacted departments, are reviewed frequently to remain current, and are consistently communicated and enforced.
Basics of Hardware Asset Management
The Power of ITAM Centralization
Best Practices for Asset Standards
Implementing a Program
Project Planning
Change Management
Measuring Success
Tools & Automation
Repository Tool
Discovery Tool
Acquisition & Receiving
Selection & Negotiations
Managing the Inventory
Management During Use
IMAC Process
Improving the Program
Improving the Value of Assets
Hardware Security
Reuse & Disposal Processes
E-waste Decisions
Evaluating ITAD Vendors
Certified Asset Management Professional
The use of technology in business has grown extensively over the past three decades and continues to grow exponentially daily. With that growth comes the need for ITAM as well as the understanding of what ITAM is, the benefits it brings to an organisation, and how it crosses all functional business areas.
This course was built to provide information on each of the IAITAM Best Practice Library’s 12 Key Process Areas (KPAs), the roles and responsibilities that affect an ITAM program, core functional areas, KPA indicators, strategic positioning, and how ITAM can be brought into other frameworks such as ITSM so that they work together in the most efficient way for an organization thus producing a greater ROI for its IT portfolio.
The 12 IAITAM KPAs for ITAM
ITAM Business Practices Find Savings
Core Functional Areas
Software Asset Management
Hardware Asset Management
ITAM Program Core Functional Components
ITAM Roles and Responsibilities
Program Management
Acquisition Management
Asset Identification Management
Communication & Education Management
Compliance Management
Disposal Management
Documentation Management
Financial Management
Legislation Management
Policy Management
Project Management
Vendor Management
Certified Software Asset Manager
During this course, you will learn best practices in Software Asset Management, the “when” and “why” to question whether something should or shouldn’t be done, how to clearly identify goals and how to quantify success with metrics. Software Asset Management (SAM) is the set of business practices that support the use of software within an organisation and frequently involves a new view on how and why software traverses throughout the organisation. SAM is currently considered a necessary business function by many organisations who view Software Asset Managers as key contributors to their overall organisational success.
Reducing Risk
Increasing Accountability
Uncovering Savings
Gaining Control of the IT Environment
The Scope of Software
Strategic License Management
Software Harvesting
License Documentation
The Right to Audit
Proactive vs. Reactive
SAM
Developing Goals
Savings Opportunities
ITAM Compliance
Audit Letter
Examples of License
Data Documentation
Compliance
Enforcement
Understanding the
EULA
Due Diligence for Compliance
The Art of Negotiation
Ts & Cs Advice
ITAM Automation
Selecting a Discovery
Tool
ITAM Repository
Hardware & Organisational Impacts
Certified Asset Management Security Expert
This course exposes the attendee to new concepts as to how the ITAM program benefits and relates to security initiatives. IT asset lifecycle management is relevant for security initiatives as a critical IT base and provides the student with a means of working with and understanding the roles and responsibilities of those persons who will implement, manage, and direct security initiatives for their organisation.
Security is a responsibility shared by everyone within an organisation. Understand how IT Asset Management can facilitate a more robust security approach that helps reduce response time to incidents and helps identify intrusions. You can’t secure what you don’t know you have!
BRIDGING THE GAP BETWEEN IT ASSET MANAGEMENT, ITAM, AND IT SECURITY
The intent of security is to manage risks and the extent of the loss after an incident. This simplistic definition does not do justice to the enormous scope of organizational security and the complexity of the processes required. The investment in security processes, automation, and professionals has been significant for most organizations and continues to consume budgets on an ongoing basis, from physical security to the myriad types of information security. Yet, organizational security is routinely rated poorly, especially with the rapidly growing threats to information security. At the same time, the consequences of these failures escalate as laws are put in place to protect individual privacy, create reporting requirements, and demand accurate inventory information on which to build security processes. The responsibility for securing the organization and its data is a priority for most organizations and should be part of every employee’s responsibility.
Scope of IT Security & ITAM
Threat Prevention vs. Threat Protection
Decentralized vs. Centralized Security
The IT Security Plan
ITAM’s Role in Risk Management
The 12 KPAs & Security
Program Management & Security
Communication & Education Management & Security
Policy Management & Security
Acquisition Management & Security
Asset Identification Management & Security
Disposal Management & Security
Project Management & Security
Documentation Management & Security
Financial Management & Security
Legislation Management & Security
Compliance Management & Security
Vendor Management & Security
Assessing Asset Risk Level
Program Issues by Asset Type
ITAM Program Assessment for Security
INTERESTED IN TRAINING?
Please fill out this form and we’ll get back to you