{"id":22,"count":6,"description":"Est-ce que les outils gratuits que vous utilisez sont vraiment sans contreparties et s\u00e9curis\u00e9s ? A travers l\u2019analyse de leurs avantages pratiques mais aussi de leurs limites en mati\u00e8re de s\u00e9curit\u00e9 et de confidentialit\u00e9, ce webinaire vous aidera \u00e0 comprendre l\u2019impact de ces solutions sur votre autonomie digitale. Vous apprendrez ainsi \u00e0 choisir les bons outils de messagerie, VPN, gestionnaires de mots de passe, ainsi que d\u2019autres logiciels libres qui respectent la souverainet\u00e9 num\u00e9rique.","link":"https:\/\/cyberforgood.org\/fr\/modules\/module-3-ess\/","name":"Module 3","slug":"module-3-ess","taxonomy":"index","parent":18,"meta":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Module 3 - Cyber for Good<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberforgood.org\/fr\/modules\/module-3-ess\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Module 3 - Cyber for Good\" \/>\n<meta property=\"og:description\" content=\"Est-ce que les outils gratuits que vous utilisez sont vraiment sans contreparties et s\u00e9curis\u00e9s ? A travers l\u2019analyse de leurs avantages pratiques mais aussi de leurs limites en mati\u00e8re de s\u00e9curit\u00e9 et de confidentialit\u00e9, ce webinaire vous aidera \u00e0 comprendre l\u2019impact de ces solutions sur votre autonomie digitale. Vous apprendrez ainsi \u00e0 choisir les bons outils de messagerie, VPN, gestionnaires de mots de passe, ainsi que d\u2019autres logiciels libres qui respectent la souverainet\u00e9 num\u00e9rique.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberforgood.org\/fr\/modules\/module-3-ess\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber for Good\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"CollectionPage\",\"@id\":\"https:\/\/cyberforgood.org\/fr\/modules\/module-3-ess\/\",\"url\":\"https:\/\/cyberforgood.org\/fr\/modules\/module-3-ess\/\",\"name\":\"Module 3 - Cyber for Good\",\"isPartOf\":{\"@id\":\"https:\/\/cyberforgood.org\/fr\/#website\"},\"breadcrumb\":{\"@id\":\"https:\/\/cyberforgood.org\/fr\/modules\/module-3-ess\/#breadcrumb\"},\"inLanguage\":\"fr-FR\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cyberforgood.org\/fr\/modules\/module-3-ess\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/cyberforgood.org\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ESS\",\"item\":\"https:\/\/cyberforgood.org\/fr\/modules\/ess\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Module 3\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cyberforgood.org\/fr\/#website\",\"url\":\"https:\/\/cyberforgood.org\/fr\/\",\"name\":\"Cyber for Good\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/cyberforgood.org\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cyberforgood.org\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cyberforgood.org\/fr\/#organization\",\"name\":\"Cyber for Good\",\"url\":\"https:\/\/cyberforgood.org\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/cyberforgood.org\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cyberforgood.org\/wp-content\/uploads\/2025\/09\/Logo-CFG.svg\",\"contentUrl\":\"https:\/\/cyberforgood.org\/wp-content\/uploads\/2025\/09\/Logo-CFG.svg\",\"caption\":\"Cyber for Good\"},\"image\":{\"@id\":\"https:\/\/cyberforgood.org\/fr\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Module 3 - Cyber for Good","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberforgood.org\/fr\/modules\/module-3-ess\/","og_locale":"fr_FR","og_type":"article","og_title":"Module 3 - Cyber for Good","og_description":"Est-ce que les outils gratuits que vous utilisez sont vraiment sans contreparties et s\u00e9curis\u00e9s ? A travers l\u2019analyse de leurs avantages pratiques mais aussi de leurs limites en mati\u00e8re de s\u00e9curit\u00e9 et de confidentialit\u00e9, ce webinaire vous aidera \u00e0 comprendre l\u2019impact de ces solutions sur votre autonomie digitale. Vous apprendrez ainsi \u00e0 choisir les bons outils de messagerie, VPN, gestionnaires de mots de passe, ainsi que d\u2019autres logiciels libres qui respectent la souverainet\u00e9 num\u00e9rique.","og_url":"https:\/\/cyberforgood.org\/fr\/modules\/module-3-ess\/","og_site_name":"Cyber for Good","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"CollectionPage","@id":"https:\/\/cyberforgood.org\/fr\/modules\/module-3-ess\/","url":"https:\/\/cyberforgood.org\/fr\/modules\/module-3-ess\/","name":"Module 3 - Cyber for Good","isPartOf":{"@id":"https:\/\/cyberforgood.org\/fr\/#website"},"breadcrumb":{"@id":"https:\/\/cyberforgood.org\/fr\/modules\/module-3-ess\/#breadcrumb"},"inLanguage":"fr-FR"},{"@type":"BreadcrumbList","@id":"https:\/\/cyberforgood.org\/fr\/modules\/module-3-ess\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/cyberforgood.org\/fr\/"},{"@type":"ListItem","position":2,"name":"ESS","item":"https:\/\/cyberforgood.org\/fr\/modules\/ess\/"},{"@type":"ListItem","position":3,"name":"Module 3"}]},{"@type":"WebSite","@id":"https:\/\/cyberforgood.org\/fr\/#website","url":"https:\/\/cyberforgood.org\/fr\/","name":"Cyber for Good","description":"","publisher":{"@id":"https:\/\/cyberforgood.org\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberforgood.org\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/cyberforgood.org\/fr\/#organization","name":"Cyber for Good","url":"https:\/\/cyberforgood.org\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/cyberforgood.org\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/cyberforgood.org\/wp-content\/uploads\/2025\/09\/Logo-CFG.svg","contentUrl":"https:\/\/cyberforgood.org\/wp-content\/uploads\/2025\/09\/Logo-CFG.svg","caption":"Cyber for Good"},"image":{"@id":"https:\/\/cyberforgood.org\/fr\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/cyberforgood.org\/fr\/wp-json\/wp\/v2\/index\/22","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberforgood.org\/fr\/wp-json\/wp\/v2\/index"}],"about":[{"href":"https:\/\/cyberforgood.org\/fr\/wp-json\/wp\/v2\/taxonomies\/index"}],"up":[{"embeddable":true,"href":"https:\/\/cyberforgood.org\/fr\/wp-json\/wp\/v2\/index\/18"}],"wp:post_type":[{"href":"https:\/\/cyberforgood.org\/fr\/wp-json\/wp\/v2\/module?index=22"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}