Skip to main content
close Search

Search

Looking for instructor-led training?

  • Modul

    Application security

    7 Themen

    1 Std. 25 Min.

    Für alle Benutzer sichtbar
  • Learn how to authorize users to define roles and assign privileges to members of an access group.

  • Modul

    Attribute-based access control

    5 Themen

    1 Std. 5 Min.

    Für alle Benutzer sichtbar
  • Configure attribute-based access control to enforce security requirements for a specific case or data instance, based on case or session data.

  • Modul

    Organizing and managing access to case attachments

    3 Themen

    25 Min.

    Für alle Benutzer sichtbar
  • Cases may require that users upload documents required to process and resolve the case. To organize attachments, developers can create attachment...

  • Modul

    Role-based access control

    5 Themen

    55 Min.

    Für alle Benutzer sichtbar
  • Learn how to authorize users to define roles and assign privileges to members of an access group.

  • Modul

    Securing data

    7 Themen

    55 Min.

    Für alle Benutzer sichtbar
  • Data is an important asset that must be protected from unauthorized access and use. Client-based access control manages how data is used to comply...

  • Challenge

    Creating a robotic test solution for Citrix

    6 Aufgaben

    30 Min.

    Für alle Benutzer sichtbar
  • The client company ABC Enterprises needs a Citrix Robotic solution that allows users to manage their legacy applications. Create a test solution to...

  • Challenge

    Dismissing a Citrix logon window

    4 Aufgaben

    20 Min.

    Für alle Benutzer sichtbar
  • As a developer, you are tasked with creating a Citrix robotic solution for your company to allow users to manage a legacy application in a mixed mode...

  • Challenge

    Organizing and managing access to case attachments

    4 Aufgaben

    30 Min.

    Für alle Benutzer sichtbar
  • Applicants for an open position at TGB must submit a resume as part of the application process. To ensure the security of resumes attached to a...

  • Challenge

    Securing an application using attribute-based access control

    4 Aufgaben

    30 Min.

    Für alle Benutzer sichtbar
  • Each candidate case includes a Taxpayer Identification Number (TIN) to identify the candidate. This information is considered sensitive personal...

We'd prefer it if you saw us at our best.

Pega Academy has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.

Close Deprecation Notice