Red Hat Security: Identity Management and Active Directory Integration (RH362)/EX362


Red Hat Security: Identity Management and Active Directory Integration (RH362) Certification Training Course Overview

The Red Hat Security: Identity Management and Active Directory Integration (RH362) training course gives you a detailed overview of Red Hat Identity Management (IdM) capabilities, including Active Directory trusts, multi-product federation, configuration management with Ansible, integrated certificate management, single sign-on, one-time passwords, and cybersecurity policy conformance.

Who should do Red Hat Security: Identity Management and Active Directory Integration (RH362) training?

  • Red Hat Certified System Administrator (RHCSA)
  • Identity management specialist or engineer
  • Access management specialist or engineer
  • Web application developer
  • DevOps specialist
This course prepares you for Exam EX362. Download Course Contents

Red Hat Security: Identity Management and Active Directory Integration (RH362) Course schedule & Prices

Schedule & Prices
Course Details Schedule
Live Virtual Classroom (Instructor-Led)
Duration : 4 Days (8 Days for 4 Hours/Day)
Fee : USD 1,800 (Includes Taxes) 



July
8 Hours/Day
12-15
13-16
20-23
12-21
13-22
20-29
August
8 Hours/Day
03-06
09-12
10-13
17-20
03-12
09-18
10-19
17-26
September
8 Hours/Day
07-10
13-16
14-17
21-24
07-16
13-22
14-23
21-30
October
8 Hours/Day
05-08
05-14
Fly-Me-a-Trainer
Duration : 4 Days
Fee : On Request
Client's Location
As per mutual convenience
Classroom Training (Available: London, Dubai, India, Sydney, Vancouver)
Duration : 4 Days
Fee : On Request
On Request

Enquire Now




Input symbols

Course Prerequisites

  • Red Hat Certified System Administrator (RHCSA) certification ( Mandatory)
  • Be certified as a Red Hat Certified Engineer (RHCE) (recommended, not Mandatory)
  • Red Hat Server Hardening (RH413)


On completion of this training, you will know:

  • Create and manage a scalable, resilient Identity Management realm, including both Linux and Microsoft Windows clients and servers.
  • Create and manage secure access configurations, including managing and troubleshooting Kerberos, certificate servers, and access control policies.
  • Integrate IdM as the backend for other major enterprise tools in the Red Hat portfolio, including Satellite Server and Tower.