關於該網站
郵件列表
率
API
聯繫我們
語言:
×
登錄
電子郵件地址
密碼
通過登錄
忘記密碼?
登記表
登錄
貨幣:
EUR
USD
GBP
CHF
RUB
JPY
CNY
CAD
AUD
×
登記表
電子郵件地址
密碼
通過登錄
忘記密碼?
登記表
關於該網站
郵件列表
聯繫我們
Toggle navigation
菜單
國家
搜索
信息來源
標籤
獲獎者
供應商
客戶
關於該網站
郵件列表
登記表
登錄到網站
聯繫我們
高級搜索
主頁
國家招標
South Africa: 招標
Quotations are hereby invited for the Supply and delivery of local content cementitious material to Mzimvubu Water Project – Access Road near Maclear in the Eastern Cape Province. Scope: 1. Supply and deliver of 50kg cement bags CEM II/A-L 42.5N x 4 000; 2. Transportation of cement bags x 4 000. (投標 №113086376cn)
請註冊
分享這個:
國家:
South Africa
語言:
EN
數: 113086376
出版日期: 29-10-2024
源:
ONLINE TENDERS
頁面上的操作
打印這個
描述
有關招標的全部信息已關閉。
有關該站點的更多信息,請閱讀以下信息。
關於我們
俄羅斯和世界範圍內招標和採購的領先搜索引擎
俄羅斯和世界上最大的招標和採購來源數據庫
根據您的設置免費提供每日新聞
您需要的格式的中標者信息
方便顯示和上傳信息
選擇我們
入門
在站點上註冊,之後您可以使用以下站點功能:
為您的關鍵短語訂閱
免費 b>郵件列表
查看招標公告
以Excel格式導出摘要信息
查看有關標書的中標者,供應商和客戶的部分信息
登記表
要使用網站的所有功能並查看全部信息,您需要註冊一個商業帳戶
選擇關稅
以任何可能的方式付費進行訪問
完全訪問
Quotations are hereby invited for the supply and delivery of black refuse bags (60 micron). Specification: Refuse bag 750 x 950mm, 60 micron black, high quality, heavy duty (200 in a pack/bale), qty: 450.
源:
ONLINE TENDERS
Tenders are hereby invited to perform electrical installation, maintenance and repair work on the HV, MV and LV network for a period ending on 30 June 2027.
源:
ONLINE TENDERS
Proposals are hereby invited for the provision of office accommodation for a period of up to five (5) years in respect of Empangeni Local Office (leases ranging from seven to ten years will also be considered).
源:
ONLINE TENDERS
Bids are hereby invited for the appointment of a service provider to install the Electronic Access Control System (EACS) at the Client’s offices – Animal Production Institute. Scope: The contractor shall provide complete facility drawings including the following: - Architectural floor plans indicating all system device locations; - Wiring schematics for all devices including cable types, lengths, routings and termination requirements; - Complete block diagram of the EACS; - Detailed drawings showing mounting and fastening methods for system components. System commissioning requirements and report format: Product Manuals: Upon completion of the system installation, the contractor shall make available print or digital versions of the following manuals: - Hardware manual describing the installation, configuration and operation for hardware deployed as part of the EACS installation; - Software manual describing the proper configuration and operation of the Access Control Server; - Maintenance manual describing the proper maintenance and repair of the EACS. Warranty & Software Maintenance Agreements: - Upon completion of the system installation, the contractor shall make available the manufacturers product warrant, applicable licenses and software maintenance agreement.
源:
ONLINE TENDERS
Tenders are hereby invited for the supply and delivery of battery chargers and associated vented Nickel Cadmium battery banks during 36-month period: Electricity Unit.
源:
ONLINE TENDERS
Tenders are hereby invited for the provision of certified cyber security and enterprise architecture related training services to the client for a period of three (3) years. Scope of Work: Provisioning of services for formalised training and certification for industry recognised and accredited courses within the domains of Cybersecurity, Information management, business analysis and enterprise architecture. The courses identified have been selected through research and discussion within the business as well as being internationally recognised and accredited. Deliverables: The training institute (referred to as the Tenderer) must provide facilitated training on the listed accredited courses that are industry and world recognised within their fields. All the courses listed have been developed by leading training organisations and offer professional certifications in the field of information technology (IT), Cybersecurity, Data and Project management. The training institute needs to be Authorised or Accredited by the professional certification body like CompTIA, EC-Council, ISACA, ISC2 IIBA, Axelos, The Open Group and DAMA to facilitate most courses listed and have an accredited examination facility to allow students to write the accreditation examination as required. The courses listed form part of a structured training plan that aims to allow client"s employees a formalised method to be trained. The tenderer/institute should facilitate the training for courses listed below as well as provide a mechanism for trainees to write the certification examination. Primary requirement (foundational) Courses: These are the primary required courses a tenderer will need to offer. These courses establish knowledge required of by the business around network, information, and Cybersecurity. These listed as the primary required courses are widely offered in South Africa and industry recognised globally: • CompTIA Security+ (SY0-701), • CompTIA Network+ (N10-008), • CompTIA Cybersecurity Analyst (CySA+) (CS0-003), • CompTIA PenTest+ (PT0-002), • CompTIA Cloud+ (CV0-003), • EC-Council Certified SOC Analyst (CSA), • EC-Council - Threat intelligence analyst (C|TIA), • EC Council - Certified ethical Hacking (C|EH v12). Secondary (further development) courses: The secondary courses focus on further business needs around cybersecurity, information and Data management and system architecture role designed to ensure proficiency in technologies, Business processes and Risk management in efforts to protect networks, systems and data: • EC-Council - Hacking Forensics Investigator (CHFI v10), • EC Council - Certified incident handler (ECIH), • IIBA Entry Certificate in Business Analysis (ECBA), • IIBA Certification of Competency in Business Analysis (CCBA), • TOGAF 10 ENTERPRISE ARCHITECTURE LEVEL 1 & 2 (10th Edition), • CAPM® Exam Preparation: FULL-DAY Course, • PRINCE2® Foundation and Practitioner 7th Edition Training Course, • The CDMP® Associate Certification, • ISACA - Certified in Risk and Information systems control (CRISC), • PMP® Exam Preparation: Full day. Tertiary (Advanced) courses: The Tertiary cyber security training and courses focus on specialized and in-depth areas within the field of cyber security. They will allow staff to tackle more advanced concepts and deploy effective strategies and guide the business to improve the cybersecurity posture: • CompTIA Advanced security practitioner (CASP+) (CAS-004), • ISC2 - Certified Information Systems Security Professional (CISSP), • ISC2 - Certified Cloud Security Professional (CCSP), • ISACA - Certified Information Security Manager (CISM), • ISACA - Certified information systems Auditor (CISA).
源:
ONLINE TENDERS