Skip to main content

Módulo

Configuring security policies

Este contenido está archivado y ya no se actualiza. El progreso no está calculado. Las instancias de Pega Cloud están deshabilitadas y las insignias ya no se conceden.

Learn about the types of attacks that malicious hackers use to gain unauthorized access to Pega Platform™, and how to configure security policies to thwart these attempts.

Después de completar este módulo, podrá hacer lo siguiente:

Differentiate between the methods used to gain unauthorized access to systems
Explain how security policies can protect systems from unauthorized access
Identify the types of security policies available for Pega Platform

Disponible en la siguiente misión:

System Architect v3

We'd prefer it if you saw us at our best.

Pega Academy has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.

Close Deprecation Notice