Get in Touch

Course Outline

Introduction

  • Overview of JWT structure
  • Common use cases for JWT

JWT Validation

  • Symmetric token signature
  • Asymmetric token signature
  • Validating tokens
  • Validating claims

Addressing Stolen JWTs

  • Strategies for handling stolen JWTs
  • JWT storage practices
  • Invalidating JWTs

Managing Cryptographic Keys

  • Overview of secret keys
  • Embedding the public key
  • Embedding a URL that contains the key

JWT Vulnerabilities and Hacking Techniques

  • Brute force attacks
  • Altering the algorithm from RS256 to HS256
  • The 'None' algorithm approach

Summary and Next Steps

Requirements

  • Fundamental understanding of web services

Target Audience

  • Developers
 7 Hours

Number of participants


Price per participant

Testimonials (4)

Upcoming Courses

Related Categories