Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction
- Overview of JWT structure
- Common use cases for JWT
JWT Validation
- Symmetric token signature
- Asymmetric token signature
- Validating tokens
- Validating claims
Handling Stolen JWTs
- Strategies for dealing with stolen JWTs
- JWT storage practices
- Invalidating JWTs
Managing a Cryptographic Key
- Overview of secret keys
- Embedding the public key
- Embedding a URL containing the key
Hacking JWTs
- Brute force approach
- Modifying the algorithm RS256 to HS256
- None algorithm approach
Summary and Next Steps
Requirements
- Foundational knowledge of web services
Target Audience
- Developers
7 Hours
Testimonials (3)
Project folder and files with exercises all available to us with a virtual desktop, pair programming during the exercises
Jacob Flynn - Chemist4U
Course - React with Next.js
The lessons was very interactive and the excersices was good practical
Heino - NWK Limited
Course - Laravel and Vue.js
practice exercises