Skip to main content
close Search

Search

Looking for instructor-led training?

  • Module

    Activities

    3 Topics

    40 mins

    Visible to all users
  • Learn how to configure activities when appropriate to automate system tasks in Pega Platform™ applications.

  • Module

    Application migration

    5 Topics

    40 mins

    Visible to all users
  • An application is typically packaged and exported to move it to another system. For example, you package and export an application to migrate among...

  • Module

    Application rulesets

    3 Topics

    35 mins

    Visible to all users
  • Learn how to configure an application ruleset to package for distribution and learn about the impact the configuration has during development and run...

  • Module

    Application security

    7 Topics

    1 hr 25 mins

    Visible to all users
  • Learn how to authorize users to define roles and assign privileges to members of an access group.

  • Module

    Application versioning

    3 Topics

    30 mins

    Visible to all users
  • Pega Platform™ provides the ability to preserve a version of an application. You can edit application functionality in a new version of the...

  • Module

    Attribute-based access control

    8 Topics

    1 hr 25 mins

    Visible to all users
  • Configure attribute-based access control to enforce security requirements for a specific case or data instance, based on case or session data.

  • Module

    Automating actions when a property value changes

    2 Topics

    20 mins

    Visible to all users
  • Automate actions whenever the value of a property changes to implement more sophisticated case automations.

  • Module

    Background processing

    10 Topics

    1 hr 5 mins

    Visible to all users
  • Learn how the background processing capabilities in Pega Platform™ allow you to offload tasks to help improve throughput and efficiency. Students...

  • Module

    Configuring security policies

    4 Topics

    40 mins

    Visible to all users
  • Learn about the types of attacks that malicious hackers use to gain unauthorized access to Pega Platform, and how to configure security policies to...

We'd prefer it if you saw us at our best.

Pega Academy has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.

Close Deprecation Notice