Lesson 1Config Management Database (CMDB) concepts and mapping to inventory fieldsThis lesson brings in ideas about CMDB and shows how details from your system list connect to items, links, and service plans, helping steady flow of information between daily system records and wider IT service handling.
Configuration items and CI classesMapping inventory hosts to CIsModeling relationships and dependenciesSynchronizing CMDB and inventory dataGovernance and data quality controlsLesson 2Integration patterns: linking inventory to ticketing, monitoring, and backup systemsThis lesson shows ways to connect system list data with ticket systems, watching tools, and backup setups, making sure same names, auto updates, and good background for problems, warnings, and fixing work across the whole setup.
Linking inventory records to ticketsSharing inventory with monitoring toolsAligning backup jobs with inventory dataUsing inventory IDs across all systemsAPIs and webhooks for data synchronizationLesson 3Concise summary of the on-premises and cloud infrastructureThis lesson teaches how to make short overviews of systems on ground and in cloud, building big-picture views of space, bases, and key services that stay true to detailed records but easy for leaders to use.
Building environment overview dashboardsAggregating by site, platform, and tierHighlighting critical and shared servicesReporting capacity and utilization trendsPresenting summaries to stakeholdersLesson 4Inventory attributes: hostname, FQDN, IP addresses, MAC, OS/version, kernel, roles, services, installed packages, virtualization hostThis lesson sets out main tech details every system entry needs, showing how names, network info, OS facts, and job roles mix to make a clear, trackable record for support.
Hostnames and FQDN naming standardsIP and MAC address tracking practicesRecording OS, kernel, and build versionsDocumenting system roles and key servicesTracking installed packages and softwareFlagging virtualization hosts and clustersLesson 5Routine inventory updates: automated schedules, change hooks from config management, and audit checksThis lesson covers keeping system lists fresh with timed checks, links from setup changes, and regular reviews, stressing matching up, handling odd cases, and reporting on how new the data is.
Scheduled discovery and refresh cyclesHooks from deployment and config toolsDetecting drift and orphaned recordsAudit procedures and sampling methodsData freshness and completeness metricsLesson 6Methods to build inventory: automated discovery using SSH/WMI/agents and example queriesThis lesson looks at auto finding methods with SSH, WMI, and helpers, including ways to handle logins, safety thoughts, and sample questions that gather true, steady system info with little hand work.
Agentless discovery with SSH and WMIUsing configuration management factsDesigning lightweight inventory agentsExample queries for OS and hardwareCredential management and securityLesson 7Inventory attributes: physical location, rack, datacenter, cloud region, subnet, VLANThis lesson centers on place and network background, teaching how to note datacenter, rack, cloud area, subnet, and VLAN facts so groups can fix connection issues, plan space, and grasp real and planned spots.
Datacenter, room, and rack identifiersCloud regions, zones, and placementsSubnets, VLANs, and segment mappingDocumenting cross-site dependenciesUsing location data for incident impactLesson 8Inventory attributes: dependencies, upstream/downstream services, backup policy, monitoring groups, last patch dateThis lesson looks at links and life details, like upper and lower services, backup rules, watch groups, and fix dates, helping check effects, follow rules, and weigh risks.
Documenting upstream and downstream flowsAssigning backup tiers and retentionGrouping systems into monitoring setsTracking last patch and update datesUsing data for risk and impact analysisLesson 9Inventory attributes: ownership, business owner, application owner, SLAs, contact info, maintenance windowThis lesson details business and owner facts, including service keepers, SLAs, contacts, and fix times, showing how they guide okaying, problem raising, and timing big work.
Identifying business and application ownersCapturing SLAs and service tiersPrimary and on-call contact detailsDefining maintenance windows and freezesOwnership changes and review cadenceLesson 10List of system types to track: Linux distributions, Windows Server, hypervisor VMs, cloud VMs, network devicesThis lesson sorts main system kinds to follow, pointing out differences in details, life, and tools for Linux, Windows, watchers, cloud jobs, and network gear in one list model.
Linux distribution families and variantsWindows Server editions and rolesHypervisor hosts and guest VM recordsCloud VM instances and managed servicesNetwork devices, firewalls, and appliancesLesson 11Methods to build inventory: manual spreadsheet templates and recommended column schemasThis lesson covers hand-making system lists with sheet plans, suggesting column setups, check rules, and flows that cut mistakes and help move to auto or map-backed systems later.
Designing standard spreadsheet layoutsRecommended identification columnsCapturing technical and business fieldsData validation and dropdown controlsPreparing data for CMDB import