Skip to main content
close Search

Search

Looking for instructor-led training?

Application security

  • Module

    Application security

    7 Topics

    1 hr 25 mins

    Visible to all users
  • Learn how to authorize users to define roles and assign privileges to members of an access group.

Attribute-based access control

  • Module

    Attribute-based access control

    8 Topics

    1 hr 25 mins

    Visible to all users
  • Configure attribute-based access control to enforce security requirements for a specific case or data instance, based on case or session data.

Inviting users to an application

Debugging system performance

  • Module

    Debugging system performance

    4 Topics

    1 hr 15 mins

    Visible to all users
  • Diagnosing performance issues requires understanding the root cause of an issue. For example, a user might report that an application takes a minute...

Managing application access

Measuring system performance

  • Module

    Measuring system performance

    5 Topics

    1 hr 25 mins

    Visible to all users
  • Pega Platform™ provides tools to evaluate application performance through performance statistics and events. Performance statistics help you...

Organizing and managing access to case attachments

  • Module

    Organizing and managing access to case attachments

    4 Topics

    30 mins

    Visible to all users
  • Cases may require that users upload documents required to process and resolve the case. To organize attachments, developers can create attachment...

Role-based access control

  • Module

    Role-based access control

    5 Topics

    55 mins

    Visible to all users
  • Learn how to authorize users to define roles and assign privileges to members of an access group.

Security Checklist awareness

  • Module

    Security Checklist awareness

    1 Topic

    20 mins

    Visible to all users
    • What is the Security Checklist?
    • How do I access the Security Checklist?
    • How to use the Security Checklist?/What is the purpose?
    • What happens if...

Tracking and auditing changes to data

We'd prefer it if you saw us at our best.

Pega Academy has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.

Close Deprecation Notice