Get in Touch

Course Outline

Introduction

  • Overview of JWT structure
  • Common use cases for JWT

JWT Validation

  • Symmetric token signature
  • Asymmetric token signature
  • Token validation processes
  • Claim validation

Handling Stolen JWTs

  • Strategies for dealing with stolen JWTs
  • JWT storage mechanisms
  • Invalidating JWTs

Managing a Cryptographic Key

  • Overview of secret keys
  • Embedding the public key
  • Embedding a URL containing the key

Hacking JWTs

  • Brute force approach
  • Modifying the algorithm from RS256 to HS256
  • None algorithm approach

Summary and Next Steps

Requirements

  • Basic understanding of web services.

Target Audience

  • Software Developers
 7 Hours

Number of participants


Price per participant

Testimonials (3)

Upcoming Courses

Related Categories