Course Outline
Introduction
- Overview of JWT structure
- Common JWT use cases
JWT Validation
- Symmetric token signatures
- Asymmetric token signatures
- Token validation procedures
- Claim validation
Securing Against Stolen JWTs
- Strategies for managing compromised JWTs
- JWT storage best practices
- Methods for invalidating JWTs
Managing Cryptographic Keys
- Overview of secret keys
- Incorporating the public key
- Utilizing a URL to reference the key
JWT Vulnerabilities and Hacking Techniques
- Brute force attacks
- Algorithm confusion: Altering RS256 to HS256
- Exploiting the 'none' algorithm
Summary and Next Steps
Requirements
- Foundational understanding of web services
Target Audience
- Developers
Testimonials (4)
The lessons was very interactive and the excersices was good practical
Heino - NWK Limited
Course - Laravel and Vue.js
I like the professionality of the trainer, he really knows what he is talking about and able to explain almost even the simple subjects on the topic which is great.
Marlon - National Confederation of Cooperatives
Course - React with Next.js
practice exercises
Mateusz - DPDgroup IT Solutions sp. z o.o.
Course - React Native for iOS and Android
The vue.js is something that I never worked with and the presentation clarified few of my doubts. But again, online courses are not efficient in acquiring knowledge.