Course Outline

Introduction

  • Overview of JWT structure
  • JWT common use cases

JWT Validation

  • Symmetric token signature
  • Asymmetric token signature
  • Validating tokens
  • Validating claims

Stolen JWTs

  • Dealing with stolen JWTs
  • JWT storage
  • Invalidating JWTs

Managing a Cryptographic Key

  • Overview of secret keys
  • Embedding the public key
  • Embedding a URL containing the key

Hacking JWTs

  • Brute force approach
  • Modifying the algorithm RS256 to HS256
  • None algorithm approach

Summary and Next Steps

Requirements

  • Basic knowledge of web service

Audience

  • Developers
 7 Hours

Custom Corporate Training

Training solutions designed exclusively for businesses.

  • Customized Content: We adapt the syllabus and practical exercises to the real goals and needs of your project.
  • Flexible Schedule: Dates and times adapted to your team's agenda.
  • Format: Online (live), In-company (at your offices), or Hybrid.
Investment

Price per private group, online live training, starting from 1600 € + VAT*

Contact us for an exact quote and to hear our latest promotions

Testimonials (5)

Upcoming Courses

Related Categories