
Module
Configuring security policies
4 Topics
45 mins
Learn about the types of attacks that malicious hackers use to gain unauthorized access to Pega Platform™, and how to configure security policies to thwart these attempts.
Module
4 Topics
45 mins
Learn about the types of attacks that malicious hackers use to gain unauthorized access to Pega Platform™, and how to configure security policies to thwart these attempts.