Click here to view the presentation.
Please join us and your service provider peers for a webinar: Top 10 security changes in RHEL 8. It will be held on Wednesday, July 22nd, at 12:00 p.m. ET / 9:00 a.m. PT. This is a 1-hour webinar.
Do you know how to improve the entire cryptographic policy on a system with one command? How about being able to record exactly what an admin typed in the system—and what happened as a result? How about knowing how to prevent Python from executing unauthorized scripts? Want to customize a security policy for a Linux container?
In this session, we'll provide an in-depth look at the most notable enhancements to the many security capabilities in Red Hat® Enterprise Linux® 8 and how to use them to enhance the security of your systems. You’ll leave knowing how to improve the entire cryptographic policy on a system with one command, as well as record exactly what an admin typed in the system—and what happened as a result. You will also learn about knowing how to prevent Python from executing unauthorized scripts and customizing a security policy for a Linux container.
Time: 12:00 p.m. ET / 9:00 a.m. PT
Date: Wednesday, July 22
Any questions? Please email bison@redhat.com
This webinar is part of a series that serves as a fast-paced introduction to the key changes and features in the newest Red Hat® Enterprise Linux® 8 release, as an orientation to the latest operating system technologies. This webinar is of interest to all IT professionals (even those with minimal Linux experience) who would like an immersion into topics focused on preparing for administering, managing, and deploying this new version of Red Hat Enterprise Linux release.
See how Red Hat has incorporated the latest open source technologies into this flagship operating system. New remote management tools, filesystems, firewalls, Python3, security integration, volume management, modules and appstream package management, and networking. Experienced Linux administrators will recognize the evolution of tools to manage complex, scalable data centers, but all attendees will find value for any size of their IT installation.
Join your service provider peers for the whole RHEL webinar series:
Important Notice | |
|
|
SESSION | TIME |
---|---|
REGISTRATION & BREAKFAST | 7:30 AM – 8:30 AM |
WELCOME lorem ipsum |
8:30 AM – 8:45 AM |
KEYNOTE: lorem ipsum lorem ipsum Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse porta, nibh nec fringilla dignissim, purus ex tempus ex, eu elementum nisl massa imperdiet risus. Etiam nec orci placerat, tempor dolor eu, viverra libero. |
8:45 AM – 9:15 AM |
BREAK NETWORKING |
9:15 AM – 9:30 AM |
Lorem Ipsum
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse porta, nibh nec fringilla dignissim, purus ex tempus ex, eu elementum nisl massa imperdiet risus. Etiam nec orci placerat, tempor dolor eu, viverra libero. |
9:30 AM – 10:30 AM |
BREAK NETWORKING & SNACKS |
10:30 AM – 10:45 AM |
Lorem Ipsum 2
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse porta, nibh nec fringilla dignissim, purus ex tempus ex, eu elementum nisl massa imperdiet risus. Etiam nec orci placerat, tempor dolor eu, viverra libero. |
10:45 AM – 11:45 AM |
BREAK NETWORKING |
11:45 AM – 12:00 PM |
Lorem Ipsum
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse porta, nibh nec fringilla dignissim, purus ex tempus ex, eu elementum nisl massa imperdiet risus. Etiam nec orci placerat, tempor dolor eu, viverra libero. |
12:00 PM – 12:45 PM |
CLOSING REMARKS John Doe, Partner-In-Charge of Nonprofit |
12:45 PM – 12:55 PM |
LUNCH & NETWORKING | 12:55 PM – 2:00 PM |
Location:
BlueJeans
Bluejeans
Bluejeans, North Carolina Bluejeans
Time: X:XX a.m. - X:XX p.m.
Hear from our experts
Cras sed luctus libero. Donec id orci quis justo tincidunt placerat.