Oracle Linux Open Source Webinar Series

Hosted by
Erik Benner
Oracle ACE Director
Vice President of Enterprise Transformation, Mythics, Inc.

Upcoming Webinars

Enterprise Ansible Automation with Oracle Linux Automation Management (OLAM)

August 11, 2022 from 2PM-3PM EST

With the release of Oracle Linux Automation Manager and the Oracle Linux Automation Engine, customers now have the ability to deploy a cost effective, powerful, web-based automation engine with reporting, credentialed role-based access control, workflow automation, and job scheduling framework for Oracle Linux customers that need modern provisioning, deployment, configuration management, and task automation.

This webinar will show how OLAM can be used to automate IT operations in your environment. From provisioning new systems, patching systems, and even managing non-oracle devices like switches or even AWS Cloud. All at a lower cost that a popular competing technology.

Register Here

An Introduction to Oracle Linux 9

September 8, 2022 from 2PM-3PM EST

Oracle Linux 9 is now available for download. In this session we will cover what the differences are between 8 and 9. OL9 includes many new updates to development languages like Perl, PHP, Ruby, Node.JS and more. Also, increased security with updates to OpenSSL, OpenSCAP and more.

There are a few more noticeable changes, which will be discussed in more detail:
• What are AppStreams
• UEK7 and it's enhancements
• ARM vs X86-64
• How has the installer changed
• The new network configuration system

Register Here

Securing your Oracle Linux System

November 10, 2022 from 2PM-3PM EST

In this Linux webinar we will examine some of the main features and tools which can be used to make your Linux system more secure. We can see how features of Oracle Linux can be used to satisfy the requirements or major security standards like CIS and STIG. We also review Security Reporting, Intrusion Detection, and also how your patch strategy affects the security of the system.

Discussion and demonstrations will cover the following areas in more detail:
• Tools to secure and monitor the system for security
• How to patch process effect Security
• Enabling Kernel level intrusion detection
• How to enable FIPS 140-2

Register Here