Risk factors, recruitment tactics, and grooming signs associated with exploitation. Equips students with safety strategies, boundaries, and reporting protocols to navigate digital and physical threats.