
Module
Configuring security policies
4 Topics
40 mins
Learn about the types of attacks that malicious hackers use to gain unauthorized access to Pega Platform, and how to configure security policies to thwart these attempts.
Module
4 Topics
40 mins
Learn about the types of attacks that malicious hackers use to gain unauthorized access to Pega Platform, and how to configure security policies to thwart these attempts.
Pega Academy has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.