Skip to main content
close Search

Search

Looking for instructor-led training?

  • Mission

    Application Development Foundation

    1 Mission

    7 Modules

    2 Challenges

    20 hrs 25 mins

    Visible to all users
  • Begin your journey to learn about Pega’s Application Development capability

  • Mission

    Pega Low-Code App Factory

    4 Modules

    1 hr 38 mins

    Visible to all users
  • At its core, Pega App Factory is a lightweight framework which runs on the Pega Platform which enables repeatable low-code development success in App...

  • Module

    Activities

    3 Topics

    40 mins

    Visible to all users
  • Learn how to configure activities when appropriate to automate system tasks in Pega Platform™ applications.

  • Module

    Application Development

    4 Topics

    40 mins

    Visible to all users
  • Learn about Pega’s Application Development capability

  • Module

    Application security

    7 Topics

    1 hr 25 mins

    Visible to all users
  • Learn how to authorize users to define roles and assign privileges to members of an access group.

  • Module

    Attribute-based access control

    8 Topics

    1 hr 25 mins

    Visible to all users
  • Configure attribute-based access control to enforce security requirements for a specific case or data instance, based on case or session data.

  • Module

    Background processing

    10 Topics

    1 hr 5 mins

    Visible to all users
  • Learn how the background processing capabilities in Pega Platform™ allow you to offload tasks to help improve throughput and efficiency. Students...

  • Module

    Circumstancing

    4 Topics

    55 mins

    Visible to all users
  • Applications often need to customize behavior to match the needs of a specific situation or circumstance. For example, a call center may need to...

  • Module

    Circumstancing case processing

    7 Topics

    1 hr

    Visible to all users
  • Create variations of a rule that can be executed in specific circumstances, to better tailor application behavior to variations identified by the...

  • Module

    Configuring security policies

    4 Topics

    40 mins

    Visible to all users
  • Learn about the types of attacks that malicious hackers use to gain unauthorized access to Pega Platform, and how to configure security policies to...

We'd prefer it if you saw us at our best.

Pega Academy has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.

Close Deprecation Notice