Search
Pega Voice AI
-
Mission
Pega Voice AI
8 Modules
3 hrs 20 mins
-
Pega Voice AI assists CSRs during live phone interactions by suggesting actions based on real-time analysis of the conversation.
CSRs receive...
Senior System Architect
-
Mission
Senior System Architect
3 Missions
11 Modules
11 Challenges
1 day 8 hrs 55 mins
-
The Senior System Architect mission continues the journey to increase your knowledge of application development on Pega Platform™. The modules in this...
Access control
-
Module
Access control
5 Topics
1 hr 5 mins
-
Learn how to secure an application using role-based access control, attribute-based access control, and client-based access control.
Mobile apps for Pega applications
-
Module
Mobile apps for Pega applications
2 Topics
20 mins
-
Learn how to configure delivery options for a mobile app for a Pega Platform™ application.
Creating custom tabs
-
Module
Creating custom tabs
2 Topics
25 mins
-
Learn how to create your own customer composite tabs. Customer composite tabs are used to display a logical group of information to a user in Pega...
Configuring security policies
-
Challenge
Configuring security policies
2 Tasks
5 mins
-
GogoRoad is experiencing a large number of failed login attempts. Management suspects that the attempts are malicious attacks by an internet bot...
Configuring customer verification
-
Challenge
Configuring customer verification
3 Tasks
15 mins
-
The business wants to ensure that all customer service representative verify the identity of a customer at the start of an interaction. You have been...
Deploying a mobile app for Pega Platform
-
Challenge
Deploying a mobile app for Pega Platform
2 Tasks
30 mins
-
The HR department wants to allow new employees to enroll in a health insurance plan on their first day of employment. To ensure that new employees can...
Monitoring the guardrail compliance score
-
Challenge
Monitoring the guardrail compliance score
2 Tasks
10 mins
-
The GoGoRoad application development team has completed and checked in their work for the day. You evaluate the quality of their work by viewing the...
Securing an application using attribute-based access control
-
Challenge
Securing an application using attribute-based access control
4 Tasks
30 mins
-
Each candidate Case includes a Taxpayer Identification Number (TIN) to identify the candidate. This information is considered sensitive personal...