Professional Documents
Culture Documents
TRI
NING PROPOSAL
Pr
ese
nte
dby
Cy
ber
netCompy
ter&Secur
it
y(U)Lt
d
Of
fi
ceLi
ne:0
392
-887
972|Ema
il
:su
p p
o r
t@c
csu
g.n
et/i
nfo@c
csug.
net
1
YGlobal
Table of Contents
List of Abbreviations and Definitions ............................................................................................. 4
Non-Disclosure and Confidentiality Agreement ........................................................................... 5
COVER LETTER..................................................................................................................................... 6
INTRODUCTION: .................................................................................................................................. 7
Mission statement: ............................................................................................................................ 7
Core values:........................................................................................................................................ 7
Goals: .................................................................................................................................................. 7
Guiding Principles: ............................................................................................................................ 8
Executive Summary: ........................................................................................................................... 9
Revision Highlights: .......................................................................................................................... 10
1.0. OUR METHODOLOGY TO TRAINING PROJECTS. ................................................................... 11
1.1. Clarity of purpose (Goal focus). .......................................................................................... 11
1.2. Excellent communication skills: Accurate language. ........................................................ 11
1.3. Prioritization, planning and delegation. ............................................................................ 11
1.4. Rational conflict. .................................................................................................................. 12
1.5. Inspiration and motivation. ................................................................................................ 12
2. PROJECT BENEFICIARIES: ............................................................................................................ 13
2.1. Project approach: ...................................................................................................................... 13
3.0. Technical information .............................................................................................................. 15
3.1. Overall objective: ...................................................................................................................... 15
3.2. Division sections or lots: .......................................................................................................... 15
3.3. Items to cover during the Essentials Training: ...................................................................... 15
3.3. Volume of the contract. (Quantities). ...................................................................................... 16
3.4. Duration of the contract. .......................................................................................................... 16
3.5. Timing ....................................................................................................................................... 16
3.6. Location ..................................................................................................................................... 17
4.0. SERVICES DESCRIPTION (Tasks and expected Deliverables). .......................................... 18
4.1. Expertise and venues required .......................................................................................... 21
4.3. Organisation of the work with the Contracting Authority .................................................... 23
4.4. Other aspects ............................................................................................................................ 23
4.5. Protection of personal data of participants ............................................................................ 23
5. TEAM STRUCTURE ........................................................................................................................ 25
6. LEAD TIME TO START SERVICES ............................................................................................ 26
6.1 Methodology on how the service will be performed .............................................................. 26
6.2. Time Table ................................................................................................................................ 27
6.3. Course Outline .......................................................................................................................... 27
3
Refreshers Trainees that came with some prior computer skills and desired revision.
Beginners Trainees who had no computer skills at all prior to this training.
5
The undersigned (‘Recipient’), hereby agrees that all financial and other information
(“Information”) that has and will receive concerning Cybernet Computer & Security (U)
Ltd is confidential and will not be disclosed to any other individual or entity without prior
written consent.
The Information shall remain the property of Cybernet Computer & Security (U) Ltd and
shall be returned to Cybernet Computer & Security (U) Ltd promptly at its request
together with all copies made thereof.
__________________ __________________________
Date Signature of YGlobal
6
COVER LETTER
To;
The Executive Director,
Thru;
The Operations manager,
Head of I.T,
YGlobal - Kiyrandongo
P. O. Box
Kiyrandongo – Uganda.
We thank you for giving us the opportunity to submit our proposal in respect of
the above matter.
In line with your requirements, please find herewith attached details of our
proposal, for your kind consideration.
We trust that this is satisfactory enough; however, should you require more
information, please contact the undersigned.
Yours faithfully,
Ssegujja Patrick. C.
Director
+256 704 218263 | +256 763 328931
sse.patrick@ccsug.net
INTRODUCTION:
CYBERNET COMPUTER & SECURITY (U) LTD has been established as an Information
Technology company in Central Uganda.
Our traditional business model is based on the accomplishment of IT support services in
East Africa particularly in Uganda, both in the public and private sectors.
Based on the decision of the company to diversify our services; we have now established
this corporation in several parts of the country. In addition to Technological investments,
the company has invested portions of its assets in various technologies to meet the
demand and growing market trends.
Company Strategy:
Purpose:
To be a leader in the ICT industry by providing enhanced services and relationship.
Vision:
To provide quality services that exceeds the expectations of our esteemed customers.
Mission statement:
To build long term relationships with our customers and clients and provide exceptional
customer services by pursuing business through innovation and advanced technology.
Core values:
❖ We help people improve their live through technology
❖ We believe in treating our customers with respect, faith and diligence.
❖ We grow through creativity, invention and innovation.
❖ We integrate honesty, integrity and business ethics into all aspects of our business
functioning
Goals:
❖ Regional expansion in the field of IT and develop a strong base of key customers.
❖ Increase the assets and investments of the company to support the development
of services.
❖ To build good reputation in the field of IT and become a key player in the industry.
8
Guiding Principles:
Dedication. Every day, consistency is key. CCS is dedicated to each and every job – down
to the very last detail. It is this tenacity, attention and focus to detail on each and every
project that defines the success of this organization.
Dependable. CCS believes that a commitment to meet all its obligations punctually,
honestly and honorably. CCS believes that if you are the "go to" business, you'll never
have to worry about having to generate extra leads or word-of-mouth referrals.
Give and You Shall Receive. Give the thing you want most and you'll be amazed at what you get
in return. CCS firmly believes in this philosophy and that its efforts can be multiplied for the
greater good of the company, its customers and the community.
9
Executive Summary:
YG a non-government initiative in her mission to help increase the use of computers for
its staff has initiated a computer training program. This is focused on increase technology
use among staff in an effort to achieve better service delivery and increase performance
and productivity to people they serve with the use of technology.
YG has therefore collaborated with Cybernet Computer & Security (U) Ltd (CCS), a private
body to conduct the basic training of staff to equip them with basic and essential
computer skills to learn the new system’s functionality and service procedures.
The training is estimated to run for a period of three (03) weeks in at YG head offices. CCS
with her team of instructors will conduct the training and mobilize the training tools,
equipment and other necessary materials to effect the training as specified by YG.
Training staff to use computers and current technologies better will increase technology
use in their daily activities and they will find new methods of better service delivery,
motivation and meeting organization goals and objectives.
10
Revision Highlights:
Any changes or revisions will be highlighted in this section if project has been
resubmitted.
……………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………
11
Cybernet Computer & Security (U) Ltd (CCS) follows a standard, codified project
implementation methodology. Our methodology is a pattern-based approach that
emphasizes strong customer collaboration and high-quality system integrations. We
combine all the best practices we have adopted based on more than 12 years of
experience implementing computer training in hardware, software and related IT
equipment.
2. PROJECT BENEFICIARIES:
At the time of writing this proposal, a total number of 20 or more YGlobal staff is
estimated to be trained over a period of 3 weeks or less.
The above is subject to change by the contracting Authority over the course of the
duration of the contract.
Phase 1: Plan
• Develop Communications Plan
• Articulate Program Goals
• Develop Project Work Plan
• A detailed set of tasks with timelines, responsible parties and milestones; and
• A clear sequence, indicating which tasks are dependent on others having been
accomplished first.
Phase 2: Implement
• Continue Staff Dialogue
• Obtain YG management Approval as Needed
This phase begins with the decision to implement the training plan and culminates in the
enrollment of the training party.
Phase 3: Refine
• Monitor
• Correct Training Bugs
• Review Early Experience
Once early training bugs are resolved, a more systematic review of the training’s early
experience may be conducted.
The operating system to be used during this training will be Microsoft windows 10 or 11
and Microsoft office version 16 or 19.
Estimated volume of lots for the whole duration of the frame work contract.
Office No. Estimated no. of participants
A YGlobal Staff 1 15 - 20
Cybernet Computer Systems will provide a lump - sum unit price per day for the required
tasks.
The specific duration of each service request (work order) this frame work contract will
be defined by YG in coordination with the selected organization and agree with CCS
before commencing the service delivery.
3.5. Timing
Delivery will mainly take place on normal working days (Monday – Friday). As an
exception. (e.g.: to prevent negative impact on service delivery by staff being in training.
The contracting Authority YG may request delivery of the service outside the normal
working days. For these situations, no surcharges will be added to the awarded lump –
sum – unit prices.
17
3.6. Location
The selected organization whose employees are primary audience will participate in the
location designed and approved by YG in the respective locations listed in section 2.0
above.
The training venue designed by YG should sit between 10 and 20 trainees maximum
with 1 computer for each trainee. “Elements included in the price”.
18
The following lacks will be carried out by Cybernet Computer & Security.
Deliverable1: A training syllabus in English on the areas to be covered during the training.
The aim of this task is to ensure that training courses are efficiently organized and that
suitable training facilities are provided.
The following facilities are responsibilities of the authority but need to be monitored by
the contracting.
TASK C: Provision of general and secretarial support before and during the
training courses:
The aim of this is to provide general and secretarial support to YG and to the course
participants before and during the courses. In particular:
a) Invitation to participants.
b) Registration forms.
c) Provide a list of participants.
d) Distribution of the list of participants to be signed each day.
e) Venue to install the mobile training lab.
2. During the courses:
YG personnel might attend the course. If this is the case coordination may be assigned on
YG behalf to support in this task. YG participation however is not guaranteed.
Deliverable5: provision to YG of Training Status Report (with an Action Plan for Inking
Learning to Performance).
21
• 1 Team leader;
Session • a pool of minimum 1 - maximum 2 assistants;
• minimum 1 training in a venue that sits between 10 and 20 trainees.
Efficient communication and sharing of experience within the framework contract is put
in place within the team.
The Contracting Authority reserves the right of only activating a part of the trainers in
function of the indicative calendar and the specific needs of the selected organizations.
Coordinator/team leader:
The Contractor shall identify a coordinator/team leader within its organisation who will
represent the single point of contact for all administrative and operational
communication with the Contracting Authority. The single point of contact and if
necessary his/her replacement must fulfil the requirements set in the selection criteria.
Similarly, the Contracting Authority will designate contact persons.
All communications and exchange of information between the Contracting Authority and
the Contractor during the contract period shall be held in writing or email, in English and
be addressed to the Contractor’s single point of contact and to the contact person in the
Contracting Authority respectively.
The coordinator shall also supervise the implementation from a capacity development
point of view to ensure adaptation of methods and methodology for training services. In
addition, he/she shall safeguard that the requirements as described in this tender are
being kept. The coordinator will need to closely collaborate with the Contracting
Authority ensuring that the quality of the services meets the standards set.
Trainers/Experts:
Cybernet Computer and Security (U) Ltd will provide suitable and professional
trainers/experts. All trainers/experts must fulfil the following minimum criteria in term
of qualification and profile:
• Accredited in ICDL.
Cybernet will be responsible to present a pool of trainers/experts that can cover all
contents of the internationally recognized certification (ICDL, ECDL, Microsoft office
specialist certificate) modules asked in the tender.
Cybernet will be responsible for selecting the individual trainer/expert out of his pool
for delivering the outputs of the specific service requests of the contract. But during the
implementation of the contract the Contracting Authority will individually assess the
performance of the trainers/experts and conduct evaluation sessions to get feedback
from the participants. The Contracting Authority reserves the right to reject a trainer if
his/her performance is not satisfactory to the Contracting Authority.
Cybernet shall ensure that there is a back-up trainer/expert available in the pool. Should
a trainer/expert, become unavailable for any reason for more than one (1) week, the
back-up trainer/expert has to be provided at short notice. The back-up trainer/expert
shall continue the implementation at the required standards.
The Contractor is free to ensure the presence of an administrative support staff in each
of the services organised. This administrative support will not be invoiced separately and
will be included in the lump-sum unit price per day.
23
A kick off meeting in Kampala at the start of the performance. The aim will be to discuss
with the Contracting Authority the general implementation of the project, the work plan
and the communication with the project management team. The meeting will also aim at
clarifying to Cybernet the roles and responsibilities of the Contracting Authority during
the implementation.
As required, ad hoc meetings and conference calls will be scheduled and organised by the
Contractor during the implementation of a given service request. Prior to each of these
meetings/ conference calls the Contractor will submit to the Contracting Authority a
brief summary of any specific points that need to be discussed.
The Contractor shall be required to reply to all queries from the Contracting Authority
within two (2) working days, unless agreed otherwise.
Furthermore, the Contractor shall be obliged to ensure that the trainers/experts comply
to and follow the instructions given by the Contracting Authority, to allow smooth
administration of the courses.
The Contractor must also ensure timely and accurate invoicing for services delivered as
well as any required reporting.
pertinent data of the contract implementation and deliver them to the Contracting
Authority in the form and frequency requested.
Cybernet will act only on instructions from the Contracting Authority with regard to
processing personal data under the framework contract. Cybernet will ask in writing for
the approval of the Contracting Authority before starting any kind of personal data
processing operation. We shall inform the Contracting Authority if it receives any kind of
request from a data subject concerning any data processing operation carried out by us.
Cybernet will NOT disclose the personal data to any third parties, unless in exceptional
cases when a written prior authorisation is given by the Contracting Authority.
25
5. TEAM STRUCTURE
Team composition and task assignments Organization chart
ORGANISATIONAL STRUCTURE
I.T / Operations
MANAGER
HEAD TRAINING
DEPT CCS
INSTRUCTORS/
Training Assistants
Maintenance Transport
Team Department
The above Team will use the best practice of the company as laid down below to execute the
training assigned
The training will be conducted on a weekly basis from YGlobal offices basing on the time
frame provided by YG. We shall conduct one (1) session per day, and this is expected to
run from 4:00pm to 5:30pm (Evening) depending on the number of trainees.
Time allocation.
At instances where there are more beginners, they will be given more time and attention
to help them catch up. They will be preferred to take classes in the morning hours.
Learners will be grouped in clusters of 5-6 to help one another and share challenges they
find in using computers. Each person will be expected to contributed in class as this will
give them the motive to pay attention.
Handouts will be issued, with details on how the entire training period is to run, including
what has to be covered and on what dates and time. Specific issues will be addressed in
line with the basic operation of a computer without going in depth.
27
W E E K 2
Intermediate Discuss
Introduction
04:00 pm features of Challenges of
Office Focus on Focus on
to Microsoft Word Microsoft
Applications Microsoft Word Microsoft Excel
05:30 pm and How they Word and
and their use
are Used Solutions
W E E K 3
Table above indicates simple time allocation throughout an entire training week
Operating Computer using GUI Based Operating System: What is an Operating System;
Basics of Popular Operating Systems; The User Interface, Using Mouse; Using right Button
of the Mouse and Moving Icons on the screen, Use of Common Icons, Status Bar, Using
Menu and Menu-selection, Running an Application, Viewing of Files, Folders and
Directories, Creating and Renaming of files and folders, Opening and closing of different
Windows; Using help; Creating Short cuts, Basics of O.S Setup and Common utilities.
28
1. KNOWING COMPUTER
1.0. Introduction
1.1. Objectives
1.2. What is Computer?
1.2.1 Basic Applications of Computer
1.3 Components of Computer System
1.3.1. Central Processing Unit
1.3.2. Keyboard, mouse and VDU
1.3.3. Other Input devices
1.3.4. Other Output devices
1.3.5. Computer Memory
1.4. Concept of Hardware and Software
1.4.1. Hardware
1.4.2. Software
1.4.2.1. Application Software
1.4.2.2 Systems software
1.5 Concept of computing, data and information
1.6 Bringing computer to life
1.6.1. Connecting keyboard, mouse, monitor and printer to CPU
1.6.2. Checking power supply
1.7. Summary
Duration: At total of 1 ½ hours will be used to complete the course daily, 7 ½ Hours in
a week and a total of 22 ½ Hours will be used for the entire course with much focus on
practical involvement.
• Software that might be needed to be installed and configured will be done by YG.
• Trainees are expected to arrive on time for any session
• Trainees are expected to follow their time tables.
NB: It should be noted that these terms and conditions are subject to change without
notice.
30
Introduction:
A trainer/instructor is expected to be knowledgeable, possess excellent
communication skills, and be able to communicate at the level and in the language of
the participants.
To be effective, the trainer should take into account the nature of the target group or
audience (who are they? are they senior or line managers?) and their level of
knowledge and skill (have participants been trained in the subject to be presented or
related subjects?). Those are the key points we consider for our trainers before
making a class or presentation.
Preparation.
Time used in preparation is time well spent. On average, the amount of time we spend
preparing the first presentation of a course or training session by aninstructor
knowledgeable on the topic equals four times that spent presenting it. So a one-week
course would require four weeks of preparation. After looking up information and
consulting manuals and other resources that are relevant to the subjects (identified
in the needs assessment), we choose appropriate learning methods and we put
together a session plan.
Our trainer takes steps to acquire or prepare appropriate participants’ guides and
audiovisual aids well in advance of the targeted training date. We then have draft
materials peer reviewed by someone who is technically competent in the subject area.
Also, if possible, the trainer rehearses the presentation before colleagues, keeping in
mind issues of time and clarity.
Presentation.
The trainer always come to the training venue and the session early to check out the
room, the seating arrangements, and the audiovisual equipment (Figure 1). We make
friendly chat with participants before the session which creates a more comfortable
learning environment.
Formal introductions should take place at the beginning of the first session. One way to
do this is asking pairs of participants to interview each other; then each presents the
other to the group or records the information on a wall chart for all to see.
The actual session begins with the trainer presenting the objectives of the course or
session and summarizing its main points. These main points are then expanded using the
chosen learning methods. At the end of the session, the trainer always summarize the
discussion, making sure to allow time for questions and clarification.
• We allow plenty of time for preparing the visual aids and time for obtaining and
testing the equipment.
• We test the materials in a rehearsal before the session, preferably in front of
critical colleagues.
In a session in which participants are divided into small groups, we move from group to
group which stimulates interest.
32
Key
Instructor
Trainee
From a pedagogical point of view, the evaluation will assess the achievement of learning
objectives and participants' expectations, trainers' teaching performance and the overall
evaluation. The Contracting Authority will communicate the assessment methodology
prior to the evaluation.
The Contracting Authority will communicate the outcomes of the evaluation sessions to
the Contractor and, if necessary, will ask for actions to be taken. The Contractor can also
perform self-evaluation, without the results of it being binding to the Contracting
Authority. The Contracting Authority will closely monitor the content, methodology and
implementation of the courses to ensure that the desired level is kept.
6.8. Cancellation
In case of cancellation of a course by the Contracting Authority, the Contracting Authority
must inform the Contractor as soon as possible. The cancelled course shall be
rescheduled, without cost, at a later date suitable for the selected organisation.
In the case of cancellation by the Contractor, the Contracting Authority shall be informed
at least two (2) working days in advance and the course will have to be rescheduled at a
later date by mutual agreement between the Contracting Authority, the selected
organisation and the Contractor. In case of last minute, less than two working days before
the start of the course, cancellations if, for example, the trainer falls ill at the last minute,
Cybernet shall have measures in place to replace the trainer. If no such replacement is
available, the course shall be rescheduled.
34
7. QUALIFICATIONS:
CCS has a well trained staff to take on this training series based on their trainings
previously conducted, education and qualification levels, years of experience in
conducting trainings of this nature with successful trainings completed in the recent
years.
The total cost for training for 3 weeks is Three million eight hundred ninety-four thousand Uganda shillings
NOTE:
• It is assumed that there will be a total of 30 students to be provided with Training Material; this figure might vary and
affect costs of training materials.
• The above estimations are inclusive of VAT.
36
Training Evaluation
Instructors_______________________________________________
Do you feel the instructor(s) had thorough knowledge of the content area? YES NO
If NO, please explain:
What level of expertise would you rank yourself in this training area?
Please indicate the level of knowledge you feel you gained from this training session.
(1 being very little knowledge and 5 being great amount of knowledge)
1 2 3 4 5
Please comment on any aspect of the training you really enjoyed or learned from:
Please comment on any aspect of the training that needs improvement or areas you
wish to learn more about:
37
BENEFITS:
CCS always strive towards achieving the major goals and objectives of the contracting
party, and we all push to the limits to make any project a success in its relative discipline.
This has made us complete all previous projects successfully and always strive for better
services ahead of our career.
We believe YG will attain the best results possible through this training once conducted
with Cybernet Computer & Security (U) Ltd.
Thank You