The Blog

ITIL Qualification Scheme Structure


The purpose of the ITIL Qualification Scheme is to ensure that relevant qualifications are available to support the formalized learning requirements of individuals and organizations related to the ITIL Service Management Practices.


The design principles of the scheme specify that the Qualification Scheme must:

  1. offer qualifications that are of value to the career objectives of the student
  2. offer flexibility in how they can be delivered
  3. provide knowledge that meets the stated learning objectives and competency outcomes
  4. align to Bloom’s Taxonomy levels of abstraction for setting examination questions against the syllabus
  5. contribute to the maturity of ITSM professionalism
  6. be responsive to evolving market demand
  7. provide a transitional upgrading strategy and supporting qualifications for those wishing to enhance earlier ITIL qualifications to the current model, and those mid-stream wishing to complete qualifications under the current scheme

The ITIL Qualification Scheme is aligned to the construct of the ITIL Service Management Practices core guidance. The current core guidance has expanded upon earlier ITIL guidance by including broader ITSM practices. The result is an increase in scope, breadth and depth of the syllabuses.

The basic design incorporates a modular structure for qualifications to provide flexibility in the customer selection and the use of a credit system to achieve the Expert Certificate in ITSM and also to support innovative delivery mechanisms by the ATO community.

Scheme Structure

The Qualification Scheme, as approved by the ITIL Qualification Board, is based on content of the core ITIL Service Management Practices publications, namely service strategy, service design, service transition, service operation and continual service improvement.

The subject and content areas as included in the ITIL core publications have been grouped into a variety of combinations which cover the ITIL Service Management practice Lifecycle and Capability elements, and are organized into three levels.

Continue Reading

Certified Ethical Hacker v9 | What You Will Learn

What can you learn from a Certified Ethical Hacker?

Here, you will be exposed to an entirely deferent way of achieving optimal information security posture in their organization; by hacking it! You will scan, test, hack and secure your own systems. You will be thought the Five Phases of Ethical Hacking and thought how you can approach your target and succeed at breaking in every time! The ­ve phases include Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.

Continue Reading

Its time to mothball traditional ITSM approaches

Traditional IT services management tactics belong in museums, not in forward-looking IT departments. This article explains the reasons why.

Continue Reading
Contact Program Coordinator

Newsletter Sign-up

Training Gallery