Common Market for Eastern and Southern Africa, COMESA,African Solidarity Fund (FSA),African Union
11-03-2025
Work Detail
Expression of Interest are invited for Consultancy for Design and Implementation of Cyber Hub Essential Skills Program Location: Kigali Deadline: Tuesday, 11/03/2025 23:59 Program rationale: This program aims to equip participants with foundational cybersecurity knowledge while also evaluating their skills and potential for specialised training tracks. Objectives: Equip participants with a strong foundation in technical and organisational cybersecurity skills. Foster participants interest in cybersecurity and assess their suitability for advanced training programs. Enhancing the number of Rwandan professionals equipped with fundamental cybersecurity skills within the ecosystem. Training target group and participants profiles: 50 graduands /graduates from a variety of universities in Rwanda Graduates in IT, information systems, computer science, networks and communications, software engineering or related fields Possess a solid foundation in IT concepts, programming languages and systems administration Applicants must be residing in Rwanda Proficiency in business English is crucial, encompassing skills in reading, writing, and comprehension Training basic structure: Presentations from trainers: Trainers will lead and conduct sessions that cover content on planned topics. Hands-On Labs and Simulations:Participants engage in practical exercises and simulations that replicate real-world scenarios, including configuring security devices, conducting vulnerability assessments, and responding to simulated cyber incidents. Scenario-Based Training:Participants analyze case studies and security challenges that reflect authentic industry environments, enhancing their ability to identify and mitigate cybersecurity threats effectively. Self-Study:Beyond class hours and lab work, learners are expected to dedicate additional time to self-study, researching and reinforcing the concepts covered during sessions. 50 participants will learn using two groups (A & B) with one being a morning group and another being an afternoon group. Assessments and Examinations: Participants will undergo assessments provided by the trainers to assess comprehension of core concepts and skills. Assessments should also provide insights into participants readiness for advanced cyber security tracks. This will be reviewed and approved by the National Cyber Security Authority. 1. Tasks to be performed by the contractor The contractor is responsible for providing the following services: The bidder will be responsible for training up to 50 individuals in essential cybersecurity skills. This includes evaluating participants current skill levels, developing a comprehensive training curriculum, delivering the training, and creating a methodology to assess and report the trainings effectiveness. Work package 1: Training design and preparation Before training begins, the contractor should develop the necessary curriculum and training framework. Both the curriculum and framework will need to be approved by the GIZ team and its partners before starting the training. The following elements should be included: A description of the trainings target group Training objectives Training session plan (schedule or timing for each training session) Training curriculum, including content to be covered in each session considering the list of training topics listed below. Any additional training materials and exercises for the trainees. Inbound assessment to assess current participants levels. Post training assessment plan to assess the training effectiveness The training curriculum and content should establish a foundation in the following list of essential topics: Introduction to cyber security (include possible cyber security tracks and certifications) Cyber security technologies Cyber security architecture Network and System security Secure coding practices Vulnerability assessment Cyber incident response Cyber risk management SOC operations Cyber security laws and regulations Cyber governance and policies Cyber security ethics. Work package 2: Training delivery Training sessions: For 20 days, the contractor is responsible for delivering physical training sessions that cover the above list of training topics. Training sessions will be delivered at a physical site in Kigali that will be communicated by GIZ and the National Cyber Security Authority. For an additional 3 days, the contractor will prepare and deliver a final assessment to the trainees from the delivered training content. Coordination of the training: The contractor will oversee and ensure the training program runs smoothly (on time agreed with GIZ and its partner NCSA). The contractor will also provide progress reports as required by GIZ and its partners. Management of participants:The contractor is responsible for any communication with participants during and after the training. However, the contractor can involve GIZ and NCSA whenever is necessary. The contractor should also track the attendance of participants during every training session. Providing training content and materials: The contractor is responsible for developing and providing training content and materials such as training modules/content or books, access to online resources, access to training exercises, presentations, handouts, lab guides, and other materials to enhance participants learning experience. Work package 3: Training evaluation and participants assessment Participants assessment: The chosen contractor will assess learners (pre assessment and post-assessment) according to the curriculum delivered, providing insights on the effectiveness and impact of the training. Additionally, the post assessment should show learners readiness to pursue advanced cybersecurity pathways. Certificate of completion: The contractor proposes a design for the certificate of completion, tailored to reflect the programs successful completion and the trainees performance level. This design will be subject to review and approval by NCSA. Final report: The contractor will provide a final report upon completion of the evaluation process. The report should summarize the training outcomes, including participant feedback and recommendations for future training. Tender Link : https://www.jobinrwanda.com/job/expression-interest-eoi-consultancy-design-and-implementation-cyber-hub-essential-skills-0
We takes all possible care for accurate & authentic tender information, however Users are requested to refer Original source of Tender Notice / Tender Document published by Tender Issuing Agency before taking any call regarding this tender.