Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction
- Overview of JWT structure
- Common use cases for JWT
JWT Validation
- Symmetric token signature
- Asymmetric token signature
- Validating tokens
- Validating claims
Addressing Stolen JWTs
- Strategies for handling stolen JWTs
- JWT storage practices
- Invalidating JWTs
Managing Cryptographic Keys
- Overview of secret keys
- Embedding the public key
- Embedding a URL that contains the key
JWT Vulnerabilities and Hacking Techniques
- Brute force attacks
- Altering the algorithm from RS256 to HS256
- The 'None' algorithm approach
Summary and Next Steps
Requirements
- Fundamental understanding of web services
Target Audience
- Developers
7 Hours
Testimonials (4)
The details amout, way of explaning and the calm and confidence the trainer is inspiring.
Cosmin Ghergheles - Ness
Course - React, Redux and TypeScript
The Trainor gives more samples which really helps a lot.
Romulo - Tribal Software Philippines, Inc.
Course - Advanced TypeScript
I like the professionality of the trainer, he really knows what he is talking about and able to explain almost even the simple subjects on the topic which is great.
Marlon - National Confederation of Cooperatives
Course - React with Next.js
practice exercises