Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction
- Overview of JWT structure
- Common use cases for JWT
JWT Validation
- Symmetric token signature
- Asymmetric token signature
- Validating tokens
- Validating claims
Handling Stolen JWTs
- Strategies for dealing with stolen JWTs
- JWT storage methods
- Invalidating JWTs
Managing a Cryptographic Key
- Overview of secret keys
- Embedding the public key
- Embedding a URL containing the key
Hacking JWTs
- Brute force approaches
- Modifying the algorithm from RS256 to HS256
- The 'None' algorithm approach
Summary and Next Steps
Requirements
- Fundamental knowledge of web services.
Target Audience
- Developers
7 Hours
Testimonials (3)
Project folder and files with exercises all available to us with a virtual desktop, pair programming during the exercises
Jacob Flynn - Chemist4U
Course - React with Next.js
The lessons was very interactive and the excersices was good practical
Heino - NWK Limited
Course - Laravel and Vue.js
practice exercises