Digital Literacy & ICT Training

Digital Literacy & ICT Training

Our Digital Literacy & ICT Training program is actively empowering youth, women, and children with essential digital skills in a holistic approach. Beneficiaries undergo comprehensive hands-on skills training, gaining practical knowledge that is highly sought after in today's job market. Our recruitment runs on a rolling basis, meaning that we are accepting and approving applicants year-round.

We have a flexible and comprehensive curriculum design that allows for multiple entry and exit points, ensuring that an entry or exit does not interfere with the training process.

Minimum Requirements

For Women (Including single mothers, widows, young mothers)

  • Must be vulnerable.
  • Must be available at least 3 hours a day for three days in a week.
  • Must adhere to our standard rules of respect, commitment, hard work, and care for the organization's tools and equipment.
  • Must have a national ID or be in the process of acquiring one.
  • Must be ready for additional training in environmental awareness, life skills, business skills, entrepreneurial skills, wellness, and fitness.
  • Must sign a consent form agreeing to comply with all rules, including participation in group photos for donor reporting.

For Youths (Including school dropouts, high school leavers, primary school leavers, and others)

  • Must be between 18 and 35 years of age.
  • Must have a national ID or be in the process of acquiring one.
  • Must be available for 3 hours a day, at least 3 days a week.
  • Must not be using intoxicating drugs or any abused substances.
  • Must be willing to fully participate in environmental activities.
  • Must be of sound mind.
  • Must be ready for additional training in environmental awareness, life skills, business skills, entrepreneurial skills, wellness, and fitness.
  • Must adhere to our standard rules of respect, commitment, hard work, and care for the organization's tools and equipment.
  • Must sign a consent form agreeing to comply with all rules, including participation in group photos for donor reporting.

For Children (TechKNow Kids, including primary and high school kids)

  • Must be between 5 and 17 years old.
  • Must be actively attending primary or high school education.
  • Must bring a consent form signed by parents or guardians, along with a consent form from the school headteacher.
  • A medical report from a doctor at a government hospital.
  • Must be willing and available for 3 hours on weekends and at least 3 hours during holidays or as specified.
  • Must show respect towards others at all times.
  • Must cooperate fully with the coaching process.
  • Must take responsibility for the care of the organization's equipment.
Courses Offered

Courses Offered

ICT LEVEL FOUR (4)

It is the lowest level in our card for training. Individuals enrolling to this level will acquire the competency required to fulfill the requirements for the ICT level 4 occupation standards.

The sub courses expected to be covered here are:

  • Use of ICT devices
  • Software installations
  • Repair and maintain a computer
  • Microsoft office tools Application
  • The Internet
Click here to view Details for ICT Level 4

ICT LEVEL FIVE (5)

It is in the middle level in our card for training. Individuals enrolling to this level will acquire the competency required to fulfill the requirements for the ICT level 5 of the occupation standards.

The sub courses expected to be covered here are:

  • Identification of software to be used
  • Installation of software
  • Software Configuration Management
  • Test software functionality
  • Perform User training
Click here to view Details for ICT Level 5

ICT LEVEL SIX (6)

It is in the third and last level in our card for training. Individuals enrolling to this level will acquire the competency required to fulfill the requirements for the ICT level 6 of the occupation standards.

The sub courses expected to be covered here are:

  • Computer Networking
  • Computer Software Installation
  • Management of ICT Security Threats
  • Performing ICT System Support
  • Designing and Hosting Websites
  • Computer Repair and Maintenance
  • Graphic Designing (120 hours)
  • Management of Database Systems
  • Developing Computer Program
  • Mobile Application Development
  • Performing System Analysis and Design
Click here to view Details for ICT Level 6
Others - Cotech

OTHERS

At Cotech, we understand how dynamic our lives can be. We also understand that what works for person A must not work for person B. With this in mind, we strive to be flexible enough to reach more individuals and empower them. To be accommodative, we offer the following packages for people needing specific skills:

  • Basic Computer Skills: Introduction to computers, internet usage, and basic software applications. All freshers are required to familiarize themselves with computer applications. This is mandatory for all first-time participants. View Details
  • Advanced ICT: Programming, web development, data analysis, and cybersecurity. Participants must complete the mandatory introduction to computer applications before choosing a pathway. View Details
  • Digital Marketing: Social media management, SEO, and online advertising. View Details

Current Activities:

  • Collaborating with local schools, community centers, and universities to host ongoing training sessions.
  • Offering both online and offline training modules to accommodate different learning preferences.
  • Providing certification upon course completion to validate newly acquired skills.
View Details on Current Activities
ICT Policy

OUR ICT POLICY

Our ICT policy is a set of principles and goals that dictates the use of information and communication technologies (ICTs) in our organization. Our ICT policies help ensure that ICTs are used in a way that is compliant with legal and regulatory requirements, and that they are aligned with our objectives. To ensure no violation of the law of the land and human rights, the following simple rules will guide our engagements at all times:

  • a. Each person may only use one computer at a time.
  • b. Computers and peripherals are not to be moved or reconfigured without approval of Lab and Classrooms staff.
  • c. Students may not install software on lab computers. If you have a question regarding specific software that you need to use, contact the Classroom and Labs support team.
  • d. The use of tobacco products is not allowed in computer classrooms and labs.
  • e. Food is generally not allowed in computer labs, though some exceptions may apply. Check with staff to determine that lab’s policy.
  • f. Drinks are allowed, as long as they are in no-spill containers.
  • g. Do not display or print sexually explicit graphics.
  • h. Behavior and activities that disturb other users or disrupt the operations of the lab are not allowed. This includes, but is not limited to: physical activities such as "rough-housing," loud music, etc.
  • i. Children are only allowed in computer labs if they are well-behaved and supervised at all times. Children may not use the computers or occupy workstation areas. At no time are children to be left unattended.
  • j. Remember to log out whenever you are done using any lab computer. We cannot be held responsible for the protection of your data or account when you leave a computer logged in with your account.
  • k. Violation of any of the above rules may result in disciplinary action and the loss of lab privileges.
  • l. Respect to personal persona is non-negotiable. At all times, no one will be allowed to access others' privacy without their consent. Our network shall be used solely to access learning aids and not irrelevant or immoral materials such as pornographic sites.
  • m. At no point shall a beneficiary be allowed to get out of the class with any of our equipment.
  • n. Vulgar language, fighting, and/or stealing is a serious offense that will attract discontinuation and, consequently, might involve the police or conviction in the court of law.

Disclaimer: A break of any one rule constitutes a break of all rules. Violators will face the appropriate consequences as outlined.