@@ -17,6 +17,6 @@ Access to IICS is controlled through Manifest. Please refer to [This Documentati
## Next Steps
After getting access to IICS, you can [log in](./logging-in.md), start [training](./training/training.md), follow [tutorials](./tutorials.md), and start implementing your integration(s).
After getting access to IICS, you can [Log In to IICS](./logging-in.md), begin your [Informatica Training](./training/training.md), follow [Integration Tutorials](./tutorials.md), and start implementing your integration(s).
Our team will work on setting up any additional connectors, sub-orgs, or secure agent licenses, if applicable to your use case.
Informatica also provides documentation to get started (e.g. [getting started guide for Cloud Application Integration (CAI)](https://knowledge.informatica.com/s/article/DOC-17653?language=en_US)).