Skip to main content

Módulo

Mitigating security risks

Archived

6 Temas

51 minutos

Visible to: All users
Avanzado Pega Platform 8.3.1 Inglés
Este contenido está archivado y ya no se actualiza. El progreso no está calculado. Las instancias de Pega Cloud están deshabilitadas y las insignias ya no se conceden. Haga clic aquí para continuar con su progreso en la última versión.

Securing an application and ensuring that the correct security is set up is important. Correct security entails making sure users are who they say they are (authentication). Correct security also entails proper authorization (that users can only access cases they are allowed to access and can only see data they are allowed to see. Correct security also means identifying and addressing security vulnerabilities like cross site scripting or phishing attacks. This module examines common mistakes that can open up vulnerabilities in the system, and how to address them to help avoid potential risks.

Después de completar este módulo, podrá hacer lo siguiente:

Identify security risks
Detect and mitigate posible attacks using Content Security Policies
Identify potential vulnerabilities with the Rule Security Analyzer
Know how to secure a Pega application in production
Discuss security best practices
Use security event logging

Disponible en la siguiente misión:

Lead System Architect v1

We'd prefer it if you saw us at our best.

Pega Academy has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.

Close Deprecation Notice