Skip to main content

モジュール

Application security

Learn how to configure security policies to thwart attempts by malicious hackers to gain unauthorized access to Pega Platform™.

このモジュールを完了したら、以下の目的を達成できるようになります。

Identify the purpose and benefits of the Security Checklist feature.
Explain how security policies can protect systems from unauthorized access.
Identify the types of security policies available for Pega Platform.

このモジュールで学習したことは、下記のチャレンジで実践できます。

Configuring security policies v5 Monitoring the guardrail compliance score v4

このモジュールは、下記のミッションにも含まれています。

System Architect v5

We'd prefer it if you saw us at our best.

Pega Academy has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.

Close Deprecation Notice