Skip to main content

Search

Looking for instructor-led training?

Configuring security policies

Inviting users to an application

Managing application access

MLOps

  • Module

    MLOps

    2 Topics

    25 mins

    Visible to all users
  • Learn how to use Machine Learning Operations (MLOps) to replace the predictive model that drives a prediction with a new model. You can import a...

Next-Best-Action and customer interactions

  • Module

    Next-Best-Action and customer interactions

    2 Topics

    20 mins

    Visible to all users
  • Pega’s omni-channel artificial intelligence (AI) delivers the right action at every customer touch by crunching millions of data points in real-time.

    ...

Pega Low-Code App Factory introduction

  • Module

    Pega Low-Code App Factory introduction

    2 Topics

    22 mins

    Visible to all users
  • Learn about low-code development and review how Pega Low-Code App Factory aids in effectively scaling low-code in an enterprise.

Pega Process AI overview

  • Module

    Pega Process AI overview

    3 Topics

    35 mins

    Visible to all users
  • Gain a greater understanding of the key features, capabilities, and benefits of Prediction Studio. Prediction Studio is the dedicated workspace for...

Predicting case completion

  • Module

    Predicting case completion

    3 Topics

    35 mins

    Visible to all users
  • Pega Process AI™ can help to distinguish regular from complex claims. Complex claims often escalate into a lengthy process, which is not only costly...

Predicting fraud

  • Module

    Predicting fraud

    4 Topics

    40 mins

    Visible to all users
  • Occasionally, an insurance claim might be erroneous or even fraudulent. To detect fraud and optimize the way in which the application routes work and...

Security Checklist awareness

  • Module

    Security Checklist awareness

    1 Topic

    20 mins

    Visible to all users
    • What is the Security Checklist?
    • How do I access the Security Checklist?
    • How to use the Security Checklist?/What is the purpose?
    • What happens if...

We'd prefer it if you saw us at our best.

Pega Academy has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.

Close Deprecation Notice