Course Overview

The explosion of information and communication technology has created unprecedented opportunities for children and young people to communicate, connect, share, learn, access information and express their opinions on matters that affect their lives and their communities. But wider and more easily available access to the Internet and mobile technology also poses significant challenges to children’s safety – both online and offline. To reduce the risks of the digital revolution while enabling more children and young people to reap its benefits, governments, civil society, local communities, international organizations and the private sector must come together in common purpose.

The technology industry has a critical role to play in establishing the foundations for safer and more secure use of Internet based services and other technologies – for today’s children and future generations. Businesses must put protecting children at the heart of their work, paying special attention to protecting the privacy of young users’ personal data, preserving their right to freedom of expression, and putting systems in place to address violations of children’s rights when they occur. Where domestic laws have not yet caught up with international law, business has an opportunity – and the responsibility – to bring their business practices in line with those standards. (Guidelines for industry on child online protection, UNICEF 2015).

African children are faced with enormous challenges with regards to access and use of the internet with studies on child safety and security indicating that a quarter of African children with internet access are exposed to sexually explicit materials with only 24 percent of the children reporting such incidences.

Child online protection has become a global concern attracting several organizations like ITU, UNICEF, GSMA and the Communications Authority of Kenya (CA) leading to such organizations engaging in various campaigns as a way of creating awareness. Despite these efforts, there is a still a huge knowledge gap on how to address issues associated with Child Online Protection.

Pain Points

With advancement of Technology, children are exposed to devices connected to the Internet and their Safety Online is not guaranteed. This course will prepare stakeholders to take their specific roles on how to protect children online.

Workshop Objectives

  • To learn what is known about children’s use of communication devices,
  • To understand the law related to online child exploitation
  • To learn the technical and procedural measures on breach of child online protection
  • To address the capacity building necessary for a full-proof child online protection society
  • To address the infrastructure necessary at national levels to ensure child online safety
  • To table possible international collaborations on the issue


Workshop Learning Outcomes

  • Be able to known about children’s use of communication devices,
  • Understand the law related to online child exploitation
  • Knowledge on technical and procedural measures on breach of child online protection
  • Know the required infrastructure necessary at national levels to ensure child online safety.


Course Content/Topics

1. Child online Protection – Introduction.

2. What the law says about the COP.

3. Types of online crimes

a) Solicitation of a minor.
b) Cyber bullying,
c) chat room.
d) Child Pornography.

    • Nudity
    • Erotic Posing.
    • Explicit Sexual Activity.


4. Internet Addiction.

a) Signs of addiction.
b) Stages of addiction

    • Curiosity
    • Substitution satisfaction.
    • Escape from the world.


5. Guidelines to prevent online addiction.

a) Safe Online Tips for children.
b) Setting your limits.
c) Meeting Online/ Friends offline.
d) Accepting Invitation/ Friendship.
e) Reaction.
f) Telling someone about your concerns.

6. Safe Online tips for parents/Teachers/Guardians.

7. Combating Online Child Sexual abuse.

8 The importance of clear legislation framework on Child protection.

9. Enabling effective collaboration between

a) Hotlines
b) Law Enforcement
c) Industry
d) NGOs. Help lines and other support services.

10. Technical solutions to prevent re – victimization of victims through online images,

a) Options
b) Issues
c) Requirements in terms of processes, legislation.

11. Introduction to Security (CSCU)

a) Securing Operating Systems
b) Malware and Antivirus
c) Internet Security
d) Security on Social Networking Sites
e) Securing Email Communications
f) Securing Mobile Devices
g) Securing the Cloud
h) Securing Network Connections
i) Data Backup and Disaster Recovery


Training Methodology
A mixture of virtual online training and self-paced training.

a) Interactive Live Classroom Sessions
Live interactive classroom sessions will be conducted on Skype. Skype will enable students and Instructors to engage in video conferencing, send instant messages and share files with the participants during the training sessions. The tool is available on mobile devices, computers or tablets.

b) AFRALTI Online Learning Management Platform
This training will be delivered on AFRALTI online learning management platform built on Moodle. Moodle is one of the best learning platforms designed to provide educators, administrators and learners with a single robust, secure and integrated system to create personalized learning environments.

c) Timings
Total Class duration is 40 hours.

  • 16 hours for Virtual Instructor led training
  • 24 hours for online self-paced training
  • Virtual Instructor led classes will be conducted on weekdays (Thursday, 11am-1pm) and Friday, 11am-1pm) for 4 weeks (16 Hours).
  • Participants will be required to do two hours of self-paced study daily and take associated assessments from the e-learning platform to test their knowledge.

Target Audience

  • Ministries, Departments and Agencies
    • Ministry of Information, Communications and Technology
    • Ministry of East Africa Affairs, Labour and Social Protection
    • Ministry of Education
    • National Communications Secretariat
    • National Council for Children Services
    • Kenya Institute of Curriculum Development
    • Department of Children’s Services
    • Kenya Film Classification Board
    • National Kenya Computer Incident Response Team Coordination Center (National KE-CIRT/CC)
    • Office of the Attorney General and State Department of Justice


  • Law enforcement agencies
    • The National Police Service
    • Cybercrime Unit, Directorate of Criminal Investigations (DCI)
    • The Judiciary


  • ICT Industry
    • Communication Service Providers (Safaricom, Airtel, Telkom)
    • Internet Service Providers
    • Content Service Providers
    • Broadcasters (Free-to-air and Pay TV)


  • Non-state actors
    • Child Line Kenya
    • Plan international
    • The Cradle Foundation
    • Kenya Scouts
    • Kenya Association of Professional Counselors
    • Terres Des Hommes
    • Kenya Girl Guide Association
    • Kenya Primary School Headteachers Association (KEPSHA)
    • CODE-IP
    • Kenya Association of Professional Counselors


  • Other Organizations
    • Okoth & Kiplagat Advocates
    • Internet 4 Development Global Community
    • RCD Africa
    • Legal Chronicles


The scope covering various Government departments will ensure comprehensive handling of Child online protection for all major stakeholders. The parents will be sensitised on the threats that face their children online and how to mitigate such harm. Security and Judicial officers will be aided in investigating and prosecuting crimes involving minors.

System Requirements for the Students Computers

  • Windows 10 desktop Systems or Mac OS X 10.10
  • RAM of 8GB
  • Core i5 processor
  • We recommend a speed of 5 Mbps for the interactive sessions, access to AFRALTI e-learning platform and for other learning activities.


Upon completion of the training, the attendees will receive AFRALTI certificate.

17th January 2022 – 11th February 20224 weeksVirtual
21st February 2022 – 18th March 20224 weeksVirtual