Wednesday, January 25, 2012

System Center 2012 and working with virtual lab environments

Before we get into this week’s blog, I wanted to remind everyone that the Ohio Cloud Intelligence Conference is coming up!  Take a look at the promotions, and register ASAP to ensure your seat!  The BEST promotion in my opinion is the one we are currently running on our Facebook page.  If you hit the “Like” button, you will open up the exclusive promotions area with a promo code for the conference.  It’s a great deal, and it’s easy do.
People are always asking if they can continue using the lab environments that they get to use in our classes once the classes are finished.  Sometimes this is the case, other times it isn’t an option.  The good news for System Center users is that Microsoft has made virtual labs available to you!  What’s even better is that these labs are designed for brand new tools!  Take a look.

System Center 2012 Virtual Labs

Microsoft has four new free System Center 2012 virtual labs available. Try out the basic operations of the new suite of System Center 2012 tools
These are just a few of the available lab environments.  View all System Center 2012 Virtual Labs
Speaking of SSCM 2012, check out the brand new course below!
SCCM2012: Mastering System Center Configuration Manager 2012
This is a brand new class developed and presented by Kent Agerlund, Microsoft MVP Configuration Manager. Next version of Configuration Manager will be released in 2012, but now can you get a solid training on its new features as well as the upgrade path from earlier version. This unique training is based on the latest release version, currently RC1, of the product and is the first and only in the market at this level.

This class will take you through the installation and configuration of the main features in Configuration Manager 2012 based on Windows 2008 R2 and Windows 7. After the training you will have a solid understanding of the product and be able to use and design these features:

·         Installing different site servers
·         Working with multiple sites
·         Configuring site settings
·         Migrate from Configuration Manager 2007
·         Role based security
·         Configuring, maintaining and installing clients
·         Inventory Management
·         Reporting & Queries
·         Application deployment
·         Software updates
·         Settings management
·         Image deployment
·         Forefront Endpoint Protection 2012 beta
-Matt

Wednesday, January 18, 2012

Cloud Conference. Gain valuable insights and the opportunity to network with the best in the industry!

I’m sure you’ve heard the expression “Get your head out of the clouds!”  That expression isn’t such a bad thing anymore.  I want to introduce you to the…

Cloud Intelligence Conference: Columbus 2012

Babbage Simmel is proud to be a title sponsor of the 2012 Cloud Intelligence Conference.  The conference will take place on April 3rd, 2012 at the Aladdin Shrine Event and Conference Center.

If you haven’t already come to the conclusion that it’s no longer a matter of “if” you’ll move to the Cloud, but simply a question of “when,” this conference will help you clearly understand why so many of your competitors and colleagues have already begun their migration.

·         You’ll see proof that the savings that can be realized by eliminating capital upgrade investments and significantly reducing operating expenses are REAL
·         You’ll be able to appreciate for yourself the maturity and reliability of cloud-based business models
·         You’ll enjoy deeper level explanations of the concepts you’ve been hearing about in the press
·         You’ll find yourself attending presentations that are ideally suited to your specific role and current level of familiarity with cloud computing concepts

With more than 12 sessions across 5 carefully targeted learning tracks, you’ll leave the Cloud Intelligence Technology Conference prepared to discuss and help develop your company’s cloud computing strategy.

Please register now.  I can’t stress this enough.  With five different tracks going all day long, the seats are going to go fast.  If you “like” our facebook page and check out the exclusive offers you will find a promo code worth $300 of the list price!  That’s right, for just $99 you can have your head in the clouds all day long, and then bring back valuable information to your organization.  If that’s not enough for you; earn a $399 credit towards any Microsoft Technical or Developer training class at Babbage Simmel for each enrollment to Cloud Intelligence. All of these amazing deals for one great day.  Don’t believe me?  Check out some of the testimonials from recent Cloud Conferences around the country.

Again, register for a seat ASAP!  They won’t last long!

-Matt

Thursday, January 12, 2012

Developing Web Applications; Identity Management and Project Management Professional

This week I just wanted to quickly highlight a few classes within the next month that only have a few seats still available.  You will want to sign up for these classes ASAP to secure your seat!  Let’s take a look.
In this course, students will learn to develop advanced ASP.NET MVC and Web Forms applications using .NET Framework 4 tools and technologies. The focus will be on coding activities that enhance the performance and scalability of the Web site application. ASP.NET MVC will be introduced and compared with Web Forms so that students know when each should/could be used. This will also prepare the student for exam 70-515.
After completing this course, students will be able to:
-Describe the underlying architecture and design of a Web application.
-Develop MVC models.
-Develop MVC controllers.
-Develop MVC views.
-Optimize the design of a Web application for discoverability by search engines.
-Write server-side code for Web Forms.
-Optimize data management for Web Forms.
-Ensure quality by debugging, unit testing, and refactoring.
-Secure a Web application.
-Apply Master Pages and CSS for a consistent application UI.
-Develop client-side scripts and services for a responsive, rich, and interactive UI.
-Implement advanced AJAX in a Web application.
-Deploy a Web application.
-Develop a Web application by using Silverlight

This course has two different dates over the next month and both are filling up fast!

This four-day instructor-led course introduces and explains the features and capabilities of Microsoft Forefront Identity Manager 2010 (FIM), and provides an overview of the solution scenarios that FIM addresses. The course format includes presentation, discussion, demonstration, and many hands-on exercises. It is intended for students who have no previous Forefront Identity Manager 2010 or Microsoft Identity Lifecycle Manager 2007 (ILM) experience.
After completing this course, students will be able to:
•Understand FIM concepts and components.
•Identify appropriate FIM scenarios.
•Manage users, groups, and passwords using FIM.
•Synchronize identity data across systems, such as Active Directory and HR.
•Understand the issues involved in loading data (initial load, backup, and disaster recovery).
•Configure security for different levels of user.
•Manage password self-service reset and synchronization.
•Automate run cycles.
•Handle sets, simple workflows, and management policy rules (MPRs).


The Project Management Professional (PMP®) certification has become a highly sought-after indication of professionalism in project management. Preparing for the PMP® examination, however, can be a daunting and time-consuming experience.  In order to meet the needs of busy professionals, Babbage Simmel, one of the nation's leading project management training firms, has created PMP® 1-2-3: A Guide to Preparing for the PMP Exam, which forms the base of this intense, five-day workshop. PMP® 1-2-3 brings together the materials covered on the PMP® exam into one easy to use, step-by-step method for efficient and effective exam preparation.
In the PMP® 1-2-3 workshop, your exam preparation follows a simple three-step process:
-Learn the necessary concepts and definitions for the exam based on the PMBOK Guide, Fourth Edition and other authoritative sources of project management literature. Materials are presented in summary format within a highly visual presentation geared to the learning needs of adult learners.
-Apply the material in interactive assignments and exercises, again geared toward adult learners who learn by application
-Review and measure your progress using review templates and practice exam questions


Remember, all of these courses only have a few seats available, so sign up now!  We look forward to seeing you all soon.
-Matt







Thursday, January 5, 2012

Are we really secure?

Are you really secured?
Here are three articles that I was able to pull together from a Google search very quickly.  SpyEye malware borrows Zeus trick to mask fraud, Hacking group releases more Stratfor subscriber data, and Government engineers actively plan for cyberwar.  What does this mean exactly?  I tell you.  These three examples show that not only are we not safe in cyberspace, but that it’s OBVIOUS that we aren’t safe.
As IT professionals, we need to know how to keep the people in our organization secured.  Luckily, we have a great path for you to take to ensure that you can do this.
Let’s start with Security +
CompTIA Security+® (2008 Objectives) is the primary course you will need to take if your job responsibilities include securing network services, network devices, and network traffic. It is also the main course you will take to prepare for the CompTIA Security+ (2008 Edition) Certification examination (exam number SY0-201). In this course, you will build on your knowledge and professional experience with computer hardware, operating systems, and networks as you acquire the specific skills required to implement basic security services on any type of computer network.
You will examine advanced security concepts, principles, and implementations that pertain to enterprise level security.
Upon successful completion of this course, students will be able to:

•identify enterprise security fundamentals.
•apply enterprise security technology solutions.
•implement security design and solutions.
•manage risk, policies and procedures within an enterprise.
•integrate security solutions within an enterprise.
•conduct security research and analysis.
Finally we have CISSP Certification.
This five day, instructor-led course trains students in all areas of the security Common Body of Knowledge (CBK). They will learn about security policy development, secure software development procedures, network vulnerabilities, attack types and corresponding countermeasures, cryptography concepts and their uses, disaster recovery plans and procedures, risk analysis, crucial laws and regulations, forensics basics, computer crime investigation procedures, physical security, and much, much more. They will explore the contents and concepts that make up the diverse domains and learn how they work together to provide true "in-depth" defense.

The certification process for the Information Systems Security Officer training and certification program prepares and certifies individuals to analyze an organization's information security infrastructure in respects to threats, risks, and design a security program to mitigate risks relevent to 2011 and beyond. ISSO's will also be proficient in risk analysis, risk mitigation, application security, network security, operations security, business continuity and disaster recovery planning.
Let’s all make a New Year’s resolution to be as secure as possible in 2012.
-Matt