Data Integration can be a large and complex topic. These lessons will help you get on the road to understanding your integration options.
Note: These courses are also part of the Level 3 Model Builder Training available on the Learning Center (learning.anaplan.com). They are provided here as informational only. If you need completion tracked, you must take the Lesson in the Learning Center!

Data integration is a critical consideration when designing and building models in Anaplan. Serious contemplation must be given to how data is going to come in and out of the Anaplan ecosystem. This lesson provides:
- An explanation of Data Integration
- An Overview of the Data Integration process

Every data integration option uses Anaplan’s Application Programming Interface, or API. No matter which option is chosen from Anaplan Connect, HyperConnect, or custom built connectors, API is leveraged. This lesson includes:
- What is API
- What is REST protocol
- What can be done with API
- An API Workflow overview

There are multiple options for integrating data into Anaplan. You can use the Anaplan UX, also known as Launchpad, Anaplan Connect, HyperConnect, or Application Programming Interface (API). You can also use Anaplan Connectors for Integration Platform as a Service, or iPaaS. There are even third-party solutions such as Informatica Cloud, SnapLogic, Mulesoft, Dell Boomi, Docusign, Workiva, and Tableau. This lesson reviews the different options available.

There are several options for integrating data with Anaplan: Manual integration, Anaplan APIs, Anaplan Connect, HyperConnect, and Anaplan iPaaS connectors. Once you understand the available options, the next question becomes how do you choose the right one? This lesson will look at the questions you need to ask yourself, and your customer to help choose the right option.

Security is always a concern when working with data connections. When using tools like Anaplan Connect, Informatica Cloud, or various ETL or iPaaS connectors, there needs to be an authentication protocol that lets the system know the data is coming from a verified and trusted source. This lesson reviews:
- Identifying the different authentication methods
- Deciding which method is best in a given scenario
- Locating more resources and training on the different authentication methods