All classes available with Virtual Classroom Live! Learn More

Category: Featured

Sep 20th

Want Happier Employees? Eliminate Busywork

What happens to your employees’ motivation when half their day is spent on mindless, monotonous tasks? What meaningful contributions does your organization miss out on when employees work on autopilot?

Better yet, what if your employees could easily train software robots to do the routine work they hate?

Organizations that use Robotic Process Automation (RPA) to automate repetitive, routine activities free employees to engage their minds in more productive, advantageous ways. RPA is a time-saver for completing busywork, even complicated tasks like sorting through large quantities of data and storing customer information.

As a UiPath business partner, Babbage Simmel has repeatedly delivered high-impact RPA solutions across multiple industries. With access to hundreds of customizable automated activities, our customers achieve unparalleled increases in productivity, efficiency, and employee satisfaction.

Your organization suffers when busywork constrains employees. Download the free e-book below, Making Work Matter, and see why automating tedious tasks increases happiness at work.

Imagine the new heights your organization can reach when you unleash the full talents, energy, and creativity of your employees!

Learn more about RPA solutions at Babbage Simmel HERE.

fill out the form to access the ebook

Sep 14th

Power your future through security skilling


Organizations continue to struggle to fill the security skills gap with an estimated shortfall of 3.5 million security professionals by 2021. That’s why we strive to ensure you have the skilling and learning resources you need to keep up in our world of complex cybersecurity attacks. Babbage Simmel is excited to offer four new courses focused on Microsoft security, compliance, and identity certifications tailored to your roles and needs, regardless of where you are in your skilling journey.

Security, Compliance, and Identity Fundamentals certification course will help individuals get familiar with the fundamentals of security, compliance, and identity across cloud-based and related Microsoft services.

This certification is targeted to those looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services. This is a broad audience that may include business stakeholders, new or existing IT professionals, or students who have an interest in Microsoft security, compliance, and identity solutions. Candidates should be familiar with Microsoft Azure and Microsoft 365 and want to understand how Microsoft security, compliance, and identity solutions can span across these solution areas to provide a holistic and end-to-end solution.

Information Protection Administrator Associate certification course focuses on planning and implementing controls that meet organizational compliance needs.

The Information Protection Administrator plans and implements controls that meet organizational compliance needs. This person is responsible for translating requirements and compliance controls into technical implementation. They assist organizational control owners to become and stay compliant. They work with information technology (IT) personnel, business application owners, human resources, and legal stakeholders to implement technology that supports policies and controls necessary to sufficiently address regulatory requirements for their organization. They also work with the compliance and security leadership such as a Chief Compliance Officer and Security Officer to evaluate the full breadth of associated enterprise risk and partner to develop those policies. This person defines applicable requirements and tests IT processes and operations against those policies and controls. They are responsible for creating policies and rules for content classification, data loss prevention, governance, and protection.

Security Operations Analyst Associate certification course helps security operational professionals design threat protection and response systems.

The Microsoft Security Operations Analyst collaborates with organizational stakeholders to secure information technology systems for the organization. Their goal is to reduce organizational risk by rapidly remediating active attacks in the environment, advising on improvements to threat protection practices, and referring violations of organizational policies to appropriate stakeholders. Responsibilities include threat management, monitoring, and response by using a variety of security solutions across their environment. The role primarily investigates, responds to, and hunts for threats using Microsoft Azure Sentinel, Azure Defender, Microsoft 365 Defender, and third-party security products. Since the security operations analyst consumes the operational output of these tools, they are also a critical stakeholder in the configuration and deployment of these technologies.

Identity and Access Administrator Associate certification course help individuals design, implement and operate an organization’s identity and access management systems by using Azure Active Directory.

The Microsoft Identity and Access Administrator designs, implements, and operates an organization’s identity and access management systems by using Azure AD. They manage tasks such as providing secure authentication and authorization access to enterprise applications. The administrator provides seamless experiences and self-service management capabilities for all users. Adaptive access and governance are core elements to the role. This role is also responsible for troubleshooting, monitoring, and reporting for the identity and access environment. The Identity and Access Administrator may be a single individual or a member of a larger team. This role collaborates with many other roles in the organization to drive strategic identity projects to modernize identity solutions, to implement hybrid identity solutions, and to implement identity governance.

Get in touch with us!
Questions about Microsoft Enterprise-class security technology or any other training? Call (614) 481-4345 or e-mail info@babsim.com.

 

Apr 19th

Deadline for ALL Microsoft SATV Training Vouchers June 30, 2021!

Don’t wait and risk losing this training opportunity!
SATV (Microsoft Software Assurance Vouchers) – these MUST be created/assigned by June 30, 2021 or you will no longer have access to them. Babbage Simmel will be happy to assist. Call us today at 614-481-4345 and we will help schedule your classes in time.

What training can I take with my Microsoft training vouchers?
Select from training in Windows 10, Microsoft Office, SQL Server, SharePoint, and other Microsoft technologies.

How do I get Microsoft training vouchers?
You probably have Microsoft training vouchers available to you now and don’t know it! SATVs are bundled in with Microsoft technology purchases. Check with the person at your organization in charge of training or software acquisition to see if you have Microsoft training vouchers available

Why Redeem Your Microsoft training vouchers with Babbage Simmel?
They can only be redeemed for MOC with an authorized Microsoft Partner like Babbage Simmel. Enjoy a seamless registration process with Babbage Simmel, your one-stop partner for all of your learning and development training.

How do I redeem my Microsoft training vouchers?
Simply provide your Microsoft SATV voucher number, company email address, and voucher expiration date to us and we will do the rest!

Other questions?
Give us a call at 614-481-4345 or email info@babsim.com.

Apr 15th

Microsoft Certified: Power Platform Fundamentals


If you’re a student, business user, or beginning technical professional, this certification can accelerate your progress and give your career a boost, as you use your Microsoft Power Platform skills to improve your team’s productivity. No experience is necessary to train for it—just basic familiarity with computer technology, data analytics, cloud computing, and the internet. Think of a fundamentals certification as the first step in growing your skill set and advancing to other certifications, such as Microsoft Power Platform Functional Consultant.

The Microsoft Power Platform Fundamentals certification could be a great fit for you, if you’d like to:

  • Build solutions with Microsoft Power Platform.
  • Automate basic business processes with Power Automate.
  • Perform data analysis with Power BI.
  • Create simple Power Apps experiences.
  • Build practical chatbots with Power Virtual Agents.

This certification has no prerequisites. However, if you’d like to gain some more experience, you could:

  • Shadow a person on your team who works with Microsoft Power Platform.
  • Explore available learning paths on Microsoft Learn.
  • Sign up for an instructor-led training course.

Learn more about the instructor-led training course HERE.

Questions about Power Platform – Get in touch!

Apr 12th

5 Skills Learners Master with CompTIA Security+


CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and pursue an IT security career. Here are 5 skills that learners will master with CompTIA Security+ certification.

#1 ATTACKS, THREATS & VULNERABILITIES

Includes updated coverage of the latest threats, attacks, and vulnerabilities, such as IoT device weaknesses, newer DDoS attacks, and social engineering techniques based on current events.

#2 ARCHITECTURE & DESIGN

Includes coverage of enterprise environments and reliance on the cloud, which is growing quickly as organizations transition to hybrid networks.

#3 IMPLEMENTATION

Has been expanded to focus on administering identity, access management, PKI, basic cryptography, wireless, and end-to-end security.

#4 OPERATIONS & INCIDENT RESPONSE

Includes organizational security assessment and incident response procedures, such as basic threat detection, risk mitigation techniques, security controls, and basic digital forensics.

#5 GOVERNANCE, RISK & COMPLIANCE

Expanded to support organizational risk management and compliance to regulations, such as PCI-DSS, SOX, HIPAA, GDPR, FISMA, NIST, and CCPA.

Get in touch with us!
Questions about Security+ or any other training?  Call (614) 481-4345 or e-mail info@babsim.com.

Source: comptia.org/security

Apr 8th

Cloud Computing – A Beginner’s Guide

What is Cloud Computing?

Simply put, cloud computing is the delivery of computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the Internet (“the cloud”) to offer faster innovation, flexible resources, and economies of scale. You typically pay only for cloud services you use, helping you lower your operating costs, run your infrastructure more efficiently, and scale as your business needs change.

Benefits of Cloud Computing

Cloud computing is a big shift from the traditional way businesses think about IT resources. Here are seven common reasons organizations are turning to cloud computing services:

Cost

Cloud computing eliminates the capital expense of buying hardware and software and setting up and running on-site datacenters—the racks of servers, the round-the-clock electricity for power and cooling, and the IT experts for managing the infrastructure. It adds up fast.

Speed

Most cloud computing services are provided self-service and on-demand, so even vast amounts of computing resources can be provisioned in minutes, typically with just a few mouse clicks, giving businesses a lot of flexibility and taking the pressure off capacity planning.

Global scale

The benefits of cloud computing services include the ability to scale elastically. In cloud speak, that means delivering the right amount of IT resources—for example, more or less computing power, storage, bandwidth—right when they’re needed, and from the right geographic location.

Productivity

On-site datacenters typically require a lot of “racking and stacking”—hardware setup, software patching, and other time-consuming IT management chores. Cloud computing removes the need for many of these tasks, so IT teams can spend time on achieving more important business goals.

Performance

The biggest cloud computing services run on a worldwide network of secure datacenters, which are regularly upgraded to the latest generation of fast and efficient computing hardware. This offers several benefits over a single corporate datacenter, including reduced network latency for applications and greater economies of scale.

Reliability

Cloud computing makes data backup, disaster recovery, and business continuity easier and less expensive because data can be mirrored at multiple redundant sites on the cloud provider’s network.

Types of Cloud Computing

Not all clouds are the same and not one type of cloud computing is right for everyone. Several different models, types, and services have evolved to help offer the right solution for your needs.

First, you need to determine the type of cloud deployment, or cloud computing architecture, that your cloud services will be implemented on. There are three different ways to deploy cloud services: on a public cloud, private cloud, or hybrid cloud.

Public Cloud

Public clouds are owned and operated by a third-party cloud service providers, which deliver their computing resources, like servers and storage, over the Internet. Microsoft Azure is an example of a public cloud. With a public cloud, all hardware, software, and other supporting infrastructure is owned and managed by the cloud provider. You access these services and manage your account using a web browser.

Private Cloud

A private cloud refers to cloud computing resources used exclusively by a single business or organization. A private cloud can be physically located on the company’s on-site datacenter. Some companies also pay third-party service providers to host their private cloud. A private cloud is one in which the services and infrastructure are maintained on a private network.

Hybrid Cloud

Hybrid clouds combine public and private clouds, bound together by technology that allows data and applications to be shared between them. By allowing data and applications to move between private and public clouds, a hybrid cloud gives your business greater flexibility, more deployment options, and helps optimize your existing infrastructure, security, and compliance.

Get in touch with us!
Questions about Cloud Computing or any other training?  Call (614) 481-4345 or e-mail info@babsim.com.

Apr 1st

The 7 ITIL Guiding Principles

The ITIL® Guiding Principles are recommendations that guide an organization in all circumstances, regardless of changes in its goals, strategies, type of work, or management structure. They interact and depend upon each other. Not all principles will be critical in every situation, but they should all be reviewed on each occasion to determine how appropriate they are.

The ITIL® Guiding Principles
1. Focus on Value
2. Start Where You Are
3. Progress Iteratively with Feedback
4. Collaborate and Promote Visibility
5. Think and Work Holistically
6. Keep IT Simple and Practical
7. Optimize and Automate

#1 – Focus on Value

This guiding principle when applied effectively will enable an organization to identify and stay focused on what is truly valuable to the customer. And like in the service definition, when part of your culture, it can reduce the chaos and keep staff focused on value and help them to understand how what they do contributes to the co-creation of value. A service is a means of enabling value co-creation.

  • First Step: Know who is being served
    • Who the consumer is and who the key stakeholders are
  • Next: Understand what is truly of value to consumer
    • Focus on overall Customer Experience (CX) and User Experience (UX)

 #2 – Start Where You Are

This principle will help an organization get the most out of what they already have in terms of all their assets. It helps to eliminate waste and organize what you already have. It works closely with the Optimize and Automate guiding principle.

  • Consider what is already available to be leveraged
    • Avoid temptation to begin totally anew
  • Assess where you are
    • Measure—direct observation is always preferred method
  • Apply the principle
    • Have a proper understanding of the current state of services and methods

 #3 – Progress Iteratively with Feedback

This incorporates DevOps and Agile practices and enables your organization to produce products and services consumers need more quickly and with less errors. It supports organizations that have a bit of a risk appetite.

  • Resist the temptation to do everything at once
  • Each iteration should be both manageable and managed
  • Continually re-evaluate
    • Revise to reflect any changes in circumstances
  • Seek and use Feedback
    • Before each iteration
    • During each iteration
    • After each iteration
    • Analyze feedback to identify improvement opportunities, risks, and issues

 #4 – Collaborate and Promote Visibility

This guiding principle helps to create and maintain a safe environment where staff and consumers are enabled to be open and honest. They can be when all are focused on the same goals and objectives and have the mindset of value co-creation as in the definition of a service. It helps to break down barriers between staff and customers.

  • Inclusion is generally a better policy that exclusion
    • Creative solutions and important perspectives can be obtained from unexpected sources
  • Engage stakeholders
    • Maintain solid communication and visibility
  • Isolated work creates Silos
    • Silos can prevent information sharing
    • Assumptions and rumors can prevail
    • Note: Frameworks such as Agile and Lean require collaboration

#5 – Think and Work Holistically

This principle recognizes the complexity of systems and how holistic thinking ensures you’re not missing something in the co-creation of value for the customer. It can, for example, expidite the handling of problems… especially the more complex and impactful ones

  • Taking a holistic approach to service management includes establishing an understanding of how all the parts of an organization work together in an integrated way
  • All the organization’s activities should be focused on the delivery of value
  • Integrated methods should be used to handle activities as a whole

#6 – Keep IT Simple and Practical

This helps organizations to reduce and minimize waste. This is a significant challenge for most organizations. It applies to just about everything in the service value system. Especially to value streams and processes.

Cloud services help with this. You can use only what you need

  • Always use the minimum number of steps needed to accomplish an objective
  • Use Outcome-based thinking to produce practical solutions
  • If something provides no value, eliminate it
  • Always ask if what is being considered contributes to value creation
  • Create and use rules to handle exceptions
    • Designers need to think about exceptions, but they cannot handle them all

#7 – Optimize and Automate

This applies to the Service Desk in handling incidents and requests. For example, Automation helps to get the most of a service desk. Some incidents can be handled directly by the users with proper automation and the same for service requests.

  • Use technology to scale up and take on frequent and repetitive tasks
  • Before automating, optimize to whatever level is possible and reasonable
    • Optimization is the means to make something as effective and useful as it needs to be

Automation can save the organization in the following:

      • Lowered Costs
      • Reduced human error
      • Improved employee experience

Ready to learn more about ITIL4? Give us a call at 614-481-4345 or email info@babsim.com.

Mar 25th

Microsoft Identity and Access Administrator

Microsoft is launching a new portfolio of security training and certifications! Today we are going to introduce you to the next offering.

SC-300: Microsoft Identity and Access Administrator
Do you design, implement, and operate an organization’s identity and access management systems by using Azure AD? Do you manage tasks such as providing secure authentication and authorization access to enterprise applications? Do you troubleshoot, monitor, and report the identity and access environment? If so, you are the right person to be taking the new Microsoft Identity and Access training and exam.

Learn more about the training HERE.

Learn more about the exam HERE.

Stay tuned for information on Microsoft Information Protection Administrator certification training.

Mar 22nd

Microsoft Security Operations Analyst

Microsoft is launching a new portfolio of security training and certifications! Today we are going to introduce you to the next offering.

SC-200: Microsoft Security Operations Analyst
Do you collaborate with organizational stakeholders to secure information technology systems for the organization and reduce organizational risk by rapidly remediating active attacks in the environment? Do you advise on improvements to threat protection practices and refer violations of organizational policies to appropriate stakeholders? Do you investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, Microsoft 365 Defender, and third-party security products? Welcome to the world of Security Operations Analyst. 
Learn more about the training HERE.

Learn more about the exam HERE.

Stay tuned for information on Microsoft Identity and Access Administrator certification training.

Mar 15th

Microsoft Security, Compliance, and Identity Fundamentals


Microsoft is launching a new portfolio of security training and certifications! Today we are going to introduce you to the first offering.

SC-900: Microsoft Security, Compliance, and Identity Fundamentals
Are you looking to familiarize yourself with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services and demonstrate to others that you have that knowledge? Be one of the first to do just that by taking the new Microsoft Security Fundamentals training and exam

Learn more about the training HERE.

Learn more about the exam HERE.

Stay tuned for information on Microsoft Security Operations Analyst certification training.