Red Hat Security: Identity Management and Active Directory Integration (RH362)/EX362


Red Hat Security: Identity Management and Active Directory Integration (RH362) Certification Training Course Overview

The Red Hat Security: Identity Management and Active Directory Integration (RH362) training course gives you a detailed overview of Red Hat Identity Management (IdM) capabilities, including Active Directory trusts, multi-product federation, configuration management with Ansible, integrated certificate management, single sign-on, one-time passwords, and cybersecurity policy conformance.

Who should do Red Hat Security: Identity Management and Active Directory Integration (RH362) training?

  • Red Hat Certified System Administrator (RHCSA)
  • Identity management specialist or engineer
  • Access management specialist or engineer
  • Web application developer
  • DevOps specialist
This course prepares you for Exam EX362.

Red Hat Security: Identity Management and Active Directory Integration (RH362) (32 Hours) Download Course Contents

Live Virtual Classroom
Group Training 2050

09 - 12 May
09:00 AM - 05:00 PM CST
(8 Hours/Day)

07 - 10 Jun
09:00 AM - 05:00 PM CST
(8 Hours/Day)

05 - 08 Jul
09:00 AM - 05:00 PM CST
(8 Hours/Day)

GTR=Guaranteed to Run
1-on-1 Training (GTR) 2350
4 Hours
8 Hours
Week Days
Week End


Start Time : At any time

12 AM
12 PM


Classroom training is available in select Cities

Classroom Training (Available: London, Dubai, India, Sydney, Vancouver)
Duration : On Request
Fee : On Request
On Request

Special Solutions for Corporate Clients! Click here

Hire Our Trainers! Click here

Request More Information

Course Prerequisites

  • Red Hat Certified System Administrator (RHCSA) certification ( Mandatory)
  • Be certified as a Red Hat Certified Engineer (RHCE) (recommended, not Mandatory)
  • Red Hat Server Hardening (RH413)


On completion of this training, you will know:

  • Create and manage a scalable, resilient Identity Management realm, including both Linux and Microsoft Windows clients and servers.
  • Create and manage secure access configurations, including managing and troubleshooting Kerberos, certificate servers, and access control policies.
  • Integrate IdM as the backend for other major enterprise tools in the Red Hat portfolio, including Satellite Server and Tower.

FAQ's


Yes, fee excludes local taxes.