This introductory course provides an overview of conflict sensitivity and explains why organizations must institutionalize conflict sensitivity training and approaches. This course is relevant to anyone seeking to learn about conflict sensitivity, and we've developed the course materials with a broad and diverse audience in mind. However, most of the strategies we introduce are for peacebuilding project teams and organizations working in conflict-affected contexts.

Commander Carla Monteiro de Castro Araujo runs gender advocacy programs that are conflict sensitive (Photo: United Nations).
Commander Carla Monteiro de Castro Araujo runs gender advocacy programs that are conflict sensitive. (Photo: United Nations)

This course features a new tool created by the U.S. Institute of Peace. The Conflict Sensitivity Tool provides guidance around questions to ask throughout the different stages in the project lifecycle; however, we anticipate that the Tool will be updated in the future as new research emerges.

Learning objectives:

  • Explain the importance of conflict sensitivity for programming.
  • Distinguish key conflict-sensitive principles and practices.
  • Evaluate when, where, and how conflict sensitivity should be applied in the project lifecycle by using the USIP Conflict Sensitivity Tool.
  • Design programming that applies conflict-sensitive approaches throughout the project lifecycle.

If you cannot view the video, click here to watch it on YouTube.

Agenda

Introduction

This section introduces the core components of conflict sensitivity and why it is important for individuals and organizations working in conflict-affected contexts.

Pillars

This section explains the multi-dimensional nature of conflict sensitivity, including the role of positionality and power, institutionalization, and project integration. It also introduces USIP's Conflict Sensitivity Tool. The tool is intended to help project managers and designers address project outcomes that could exacerbate tension.

Planning

This section outlines how to use USIP's Conflict Sensitivity Tool during the planning phase of a program or project lifecycle.

Implementation and Close Out

This section outlines how to use USIP's Conflict Sensitivity Tool to assist with conflict-sensitive project implementation and decision-making practices. It ends with a presentation about conflict-sensitive evaluation mechanisms and how to apply them during project closeout.

Application

This section allows learners to see how conflict sensitivity is applied in real-life projects and to reflect on ways practitioners and organizations can improve their practice.

Conclusion

The concluding section provides an opportunity for self-assessment and a chance to earn a certificate.

Instructors and Guest Experts

Instructors

  • Amanda Blair, Ph.D., Senior Program Officer, U.S. Institute of Peace
  • Marcia Mundt, Ph.D., Program Officer, U.S. Institute of Peace

Guest Experts

Related Research & Analysis

With Cease-fire Holding, Can Israel and Iran Move Toward De-escalation?

With Cease-fire Holding, Can Israel and Iran Move Toward De-escalation?

Wednesday, June 25, 2025

Israel’s stunning and sophisticated June 13 attack on Iran set off a worrying 12-day escalatory spiral. Iran responded in short order with ballistic missile and drone strikes, which led to a series of tit-for-tat exchanges between the two sides. A cease-fire is now in place -- but will it hold?

Type: Analysis

The Element of Surprise: Space and Cyber Warfare in U.S.-China Rivalry

The Element of Surprise: Space and Cyber Warfare in U.S.-China Rivalry

Wednesday, June 18, 2025

The 2024 revelations over China’s effort to implant malware in critical U.S. infrastructure by the Volt Typhoon hacking group — as well as the Salt Typhoon group’s successful breaching of at least nine major U.S. telecoms — have renewed concern over Beijing’s constant, ongoing efforts to hack Western companies, governments and non-governmental organizations. Unlike past incidents, like those involving Chinese military unit 61398, which were largely about cyber espionage, the Volt Typhoon group was actively implanting malware designed to disrupt critical infrastructure such as water and power systems.

Type: Analysis

What Do Changes in China’s Nuclear Program Mean for India?

What Do Changes in China’s Nuclear Program Mean for India?

Thursday, March 13, 2025

At the end of 2024, the annual U.S. Department of Defense report on military and security developments in China reinforced evolving assessments of China’s rapid nuclear expansion with an alarming projection: The U.S. expects China to have 1,000 nuclear warheads by 2030 despite having maintained a nuclear arsenal of approximately 300 warheads for decades.

Type: Analysis

Taiwan Stronger: Ramping Up Defense Resilience to Counter China

Taiwan Stronger: Ramping Up Defense Resilience to Counter China

Monday, March 10, 2025

The direct threat that China poses to Taiwan continues to rise and is far more severe and serious today than ever before. In addition to the increasing daily tempo of gray-zone coercion and armed provocations all around Taiwan, the specter of an outright attack or naval blockade by China looms larger than at any other time in the post-Cold War era.

Type: Analysis

View All Research & Analysis