Get in Touch

Course Outline

Introduction

  • Overview of JWT structure
  • Common JWT use cases

JWT Validation

  • Symmetric token signatures
  • Asymmetric token signatures
  • Token validation procedures
  • Claim validation

Securing Against Stolen JWTs

  • Strategies for managing compromised JWTs
  • JWT storage best practices
  • Methods for invalidating JWTs

Managing Cryptographic Keys

  • Overview of secret keys
  • Incorporating the public key
  • Utilizing a URL to reference the key

JWT Vulnerabilities and Hacking Techniques

  • Brute force attacks
  • Algorithm confusion: Altering RS256 to HS256
  • Exploiting the 'none' algorithm

Summary and Next Steps

Requirements

  • Foundational understanding of web services

Target Audience

  • Developers
 7 Hours

Number of participants


Price per participant

Testimonials (4)

Upcoming Courses

Related Categories