Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction
- Overview of JWT structure
- Common JWT use cases
JWT Validation
- Symmetric token signatures
- Asymmetric token signatures
- Validating tokens
- Validating claims
Stolen JWTs
- Handling stolen JWTs
- JWT storage considerations
- Invalidating JWTs
Managing Cryptographic Keys
- Overview of secret keys
- Embedding the public key
- Embedding a URL containing the key
Hacking JWTs
- Brute-force approaches
- Modifying the algorithm from RS256 to HS256
- The 'none' algorithm approach
Summary and Next Steps
Requirements
- Basic knowledge of web services
Audience
- Developers
7 Hours
Testimonials (3)
Project folder and files with exercises all available to us with a virtual desktop, pair programming during the exercises
Jacob Flynn - Chemist4U
Course - React with Next.js
The lessons was very interactive and the excersices was good practical
Heino - NWK Limited
Course - Laravel and Vue.js
practice exercises