Get in Touch

Course Outline

Introduction

  • Overview of JWT structure
  • Common JWT use cases

JWT Validation

  • Symmetric token signatures
  • Asymmetric token signatures
  • Validating tokens
  • Validating claims

Stolen JWTs

  • Handling stolen JWTs
  • JWT storage considerations
  • Invalidating JWTs

Managing Cryptographic Keys

  • Overview of secret keys
  • Embedding the public key
  • Embedding a URL containing the key

Hacking JWTs

  • Brute-force approaches
  • Modifying the algorithm from RS256 to HS256
  • The 'none' algorithm approach

Summary and Next Steps

Requirements

  • Basic knowledge of web services

Audience

  • Developers
 7 Hours

Number of participants


Price per participant

Testimonials (3)

Provisional Upcoming Courses (Require 5+ participants)

Related Categories