Skip to main content
close Search

Search

Looking for instructor-led training?

  • Mission

    Pega Robot Manager

    12 Modules

    11 Challenges

    14 hrs 22 mins

    Visible to all users
  • Discover how Pega Robot Manager™ is used to manage attended and unattended automations in your enterprise. Learn how Pega Robot Manager fits into the...

  • Mission

    Pega Robotic Process Automation Overview

    1 Module

    1 hr 15 mins

    Visible to all users
  • Gain an overview of Pega Robotic Process Automation. Identify ideal use cases for this technology and differentiate between attended and unattended...

  • Mission

    Robotics System Architect

    15 Modules

    10 Challenges

    17 hrs 31 mins

    Visible to all users
  • PATCH UPDATE: Note that this mission version is based on 19.1.66 of Pega Robot Studio. Learn the basic functionality, process flow, terminology, and...

  • Module

    Application migration

    5 Topics

    40 mins

    Visible to all users
  • An application is typically packaged and exported to move it to another system. For example, you package and export an application to migrate among...

  • Module

    Application rulesets

    3 Topics

    35 mins

    Visible to all users
  • Learn how to configure an application ruleset to package for distribution and learn about the impact the configuration has during development and run...

  • Module

    Application security

    7 Topics

    1 hr 25 mins

    Visible to all users
  • Learn how to authorize users to define roles and assign privileges to members of an access group.

  • Module

    Application versioning

    3 Topics

    30 mins

    Visible to all users
  • Pega Platform™ provides the ability to preserve a version of an application. You can edit application functionality in a new version of the...

  • Module

    Attribute-based access control

    8 Topics

    1 hr 25 mins

    Visible to all users
  • Configure attribute-based access control to enforce security requirements for a specific case or data instance, based on case or session data.

  • Module

    Configuring security policies

    4 Topics

    40 mins

    Visible to all users
  • Learn about the types of attacks that malicious hackers use to gain unauthorized access to Pega Platform, and how to configure security policies to...

We'd prefer it if you saw us at our best.

Pega Academy has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.

Close Deprecation Notice