![](/themes/custom/pegaacademy_theme/images/backgrounds/module-hero.jpg)
Module
Configuring security policies
4 Topics
45 mins
Learn about the types of attacks that malicious hackers use to gain unauthorized access to Pega Platform™, and how to configure security policies to thwart these attempts.
Module
4 Topics
45 mins
Learn about the types of attacks that malicious hackers use to gain unauthorized access to Pega Platform™, and how to configure security policies to thwart these attempts.