Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction
- Overview of the JWT structure.
- Common use cases for JWTs.
JWT Validation
- Symmetric token signatures.
- Asymmetric token signatures.
- Methods for validating tokens.
- Validating claims.
Securing Against Stolen JWTs
- Strategies for handling compromised JWTs.
- JWT storage best practices.
- Invalidating JWTs.
Managing Cryptographic Keys
- Overview of secret keys.
- Embedding the public key.
- Embedding a URL that contains the key.
JWT Vulnerabilities and Hacking Techniques
- Brute force approaches.
- Altering the algorithm from RS256 to HS256.
- The 'none' algorithm approach.
Summary and Next Steps
Requirements
- Fundamental understanding of web services.
Target Audience
- Developers.
7 Hours
Testimonials (3)
Project folder and files with exercises all available to us with a virtual desktop, pair programming during the exercises
Jacob Flynn - Chemist4U
Course - React with Next.js
The lessons was very interactive and the excersices was good practical
Heino - NWK Limited
Course - Laravel and Vue.js
practice exercises