Get in Touch

Course Outline

Introduction

  • Overview of the JWT structure.
  • Common use cases for JWTs.

JWT Validation

  • Symmetric token signatures.
  • Asymmetric token signatures.
  • Methods for validating tokens.
  • Validating claims.

Securing Against Stolen JWTs

  • Strategies for handling compromised JWTs.
  • JWT storage best practices.
  • Invalidating JWTs.

Managing Cryptographic Keys

  • Overview of secret keys.
  • Embedding the public key.
  • Embedding a URL that contains the key.

JWT Vulnerabilities and Hacking Techniques

  • Brute force approaches.
  • Altering the algorithm from RS256 to HS256.
  • The 'none' algorithm approach.

Summary and Next Steps

Requirements

  • Fundamental understanding of web services.

Target Audience

  • Developers.
 7 Hours

Number of participants


Price per participant

Testimonials (3)

Upcoming Courses

Related Categories