Course Outline

Introduction

  • Overview of JWT structure
  • JWT common use cases

JWT Validation

  • Symmetric token signature
  • Asymmetric token signature
  • Validating tokens
  • Validating claims

Stolen JWTs

  • Dealing with stolen JWTs
  • JWT storage
  • Invalidating JWTs

Managing a Cryptographic Key

  • Overview of secret keys
  • Embedding the public key
  • Embedding a URL containing the key

Hacking JWTs

  • Brute force approach
  • Modifying the algorithm RS256 to HS256
  • None algorithm approach

Summary and Next Steps

Requirements

  • Basic knowledge of web service

Audience

  • Developers
 7 Hours

Number of participants



Price per participant

Testimonials (1)

Related Courses

Building Interactive Applications with React, Redux and GraphQL

28 Hours

Spring Boot, React, and Redux

14 Hours

Managing Vue JS State with Vuex

7 Hours

Next.js 14 Advanced Development

21 Hours

React with Next.js

14 Hours

Managing React State with MobX

14 Hours

Material UI

7 Hours

Ant Design

7 Hours

NestJS: Beginner to Advanced

14 Hours

REST API Development with LoopBack

14 Hours

Building Web Apps using the MEAN stack

35 Hours

Node.js & Express.js Basics, working with PM2 & WebStorm

21 Hours

Svelte

14 Hours

Advanced Svelte JS

14 Hours

Introduction to Svelte.js

14 Hours

Related Categories

1