Skip to main content
close Search

Search

Looking for instructor-led training?

  • Module

    Application security

    7 Topics

    1 hr 25 mins

    Visible to all users
  • Learn how to authorize users to define roles and assign privileges to members of an access group.

  • Module

    Applying a style to a UI element

    2 Topics

    20 mins

    Visible to all users
  • Apply defined styles to UI controls and elements to improve application branding and appearance.

  • Module

    Attribute-based access control

    8 Topics

    1 hr 25 mins

    Visible to all users
  • Configure attribute-based access control to enforce security requirements for a specific case or data instance, based on case or session data.

  • Module

    Best practices for designing and prototyping with the Pega Cosmos design system

    6 Topics

    1 hr 40 mins

    Visible to all users
  • In this module, learn the best practices for designing in the Pega Cosmos design system, including how to work with general design standards, theming...

  • Module

    Branding and theming

    9 Topics

    1 hr 35 mins

    Visible to all users
  • In this module, you learn about the skin rule form and how to create a Center of Excellence (COE) layer that implements your company brand.

  • Module

    Case view configuration with Pega Cosmos design system

    4 Topics

    1 hr 5 mins

    Visible to all users
  • In the Pega Cosmos design system, the information architecture of a case is optimized so that users can quickly understand the case's most critical...

  • Module

    Conducting usability testing

    2 Topics

    15 mins

    Visible to all users
  • Usability testing is a method for determining how easy an application is to use by testing the application with real users in a controlled setting...

  • Module

    Configuring new case creation

    2 Topics

    35 mins

    Visible to all users
  • Pega Cosmos design system introduces a new end-user experience for the case creation form. You also learn how to customize the layout and behavior of...

  • Module

    Configuring security policies

    4 Topics

    40 mins

    Visible to all users
  • Learn about the types of attacks that malicious hackers use to gain unauthorized access to Pega Platform, and how to configure security policies to...

We'd prefer it if you saw us at our best.

Pega Academy has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.

Close Deprecation Notice