Skip to main content

Module

Application security

This content is now archived and is no longer updated. Progress is not calculated. Pega Cloud instances are disabled, and badges are no longer awarded. Click here to continue your progress in the latest version.

Learn how to configure security policies to thwart attempts by malicious hackers to gain unauthorized access to Pega Platform™.

Beginner
Security
English

After completing this module, you should be able to:

Identify the purpose and benefits of the Security Checklist feature.
Explain how security policies can protect systems from unauthorized access.
Identify the types of security policies available for Pega Platform.

Practice what you learned in the following Challenge:

Monitoring the guardrail compliance score v4

Available in the following mission:

System Architect v5

We'd prefer it if you saw us at our best.

Pega Academy has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.

Close Deprecation Notice