Webinar

Top 10 Security Changes in RHEL 8

July 22, 202012:00 PM - 1:00 PM(GMT-04:00) Eastern Time (US & Canada)

Click here to view the presentation.


Please join us and your service provider peers for a webinar: Top 10 security changes in RHEL 8. It will be held on Wednesday, July 22nd, at 12:00 p.m. ET / 9:00 a.m. PT. This is a 1-hour webinar.

Do you know how to improve the entire cryptographic policy on a system with one command? How about being able to record exactly what an admin typed in the system—and what happened as a result? How about knowing how to prevent Python from executing unauthorized scripts? Want to customize a security policy for a Linux container? 

In this session, we'll provide an in-depth look at the most notable enhancements to the many security capabilities in Red Hat® Enterprise Linux® 8 and how to use them to enhance the security of your systems. You’ll leave knowing how to improve the entire cryptographic policy on a system with one command, as well as record exactly what an admin typed in the system—and what happened as a result. You will also learn about knowing how to prevent Python from executing unauthorized scripts and customizing a security policy for a Linux container.


Webinar details

Time: 12:00 p.m. ET / 9:00 a.m. PT

Date: Wednesday, July 22

Any questions? Please email bison@redhat.com


About the webinar series

This webinar is part of a series that serves as a fast-paced introduction to the key changes and features in the newest Red Hat® Enterprise Linux® 8 release, as an orientation to the latest operating system technologies. This webinar is of interest to all IT professionals (even those with minimal Linux experience) who would like an immersion into topics focused on preparing for administering, managing, and deploying this new version of Red Hat Enterprise Linux release.

See how Red Hat has incorporated the latest open source technologies into this flagship operating system. New remote management tools, filesystems, firewalls, Python3, security integration, volume management, modules and appstream package management, and networking. Experienced Linux administrators will recognize the evolution of tools to manage complex, scalable data centers, but all attendees will find value for any size of their IT installation.

Join your service provider peers for the whole RHEL webinar series:

Agenda instruction text goes here
SESSION TIME
REGISTRATION & BREAKFAST 7:30 AM – 8:30 AM
WELCOME
lorem ipsum
8:30 AM – 8:45 AM
KEYNOTE: lorem ipsum
lorem ipsum
 

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse porta, nibh nec fringilla dignissim, purus ex tempus ex, eu elementum nisl massa imperdiet risus. Etiam nec orci placerat, tempor dolor eu, viverra libero.

8:45 AM – 9:15 AM
BREAK
NETWORKING
9:15 AM – 9:30 AM
Lorem Ipsum

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse porta, nibh nec fringilla dignissim, purus ex tempus ex, eu elementum nisl massa imperdiet risus. Etiam nec orci placerat, tempor dolor eu, viverra libero.

9:30 AM – 10:30 AM
BREAK
NETWORKING & SNACKS
10:30 AM – 10:45 AM
Lorem Ipsum 2

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse porta, nibh nec fringilla dignissim, purus ex tempus ex, eu elementum nisl massa imperdiet risus. Etiam nec orci placerat, tempor dolor eu, viverra libero.

10:45 AM – 11:45 AM
BREAK
NETWORKING
11:45 AM – 12:00 PM
Lorem Ipsum

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse porta, nibh nec fringilla dignissim, purus ex tempus ex, eu elementum nisl massa imperdiet risus. Etiam nec orci placerat, tempor dolor eu, viverra libero.

12:00 PM – 12:45 PM
CLOSING REMARKS
John Doe, Partner-In-Charge of Nonprofit
12:45 PM – 12:55 PM
LUNCH & NETWORKING 12:55 PM – 2:00 PM

Location
BlueJeans
Bluejeans
Bluejeans, North Carolina  Bluejeans


Time: X:XX a.m. - X:XX p.m.

Speakers

Hear from our experts

Sponsors

Cras sed luctus libero. Donec id orci quis justo tincidunt placerat.

Gold

Silver