Course Outline
Introduction
- Overview of JWT structure
- JWT common use cases
JWT Validation
- Symmetric token signature
- Asymmetric token signature
- Validating tokens
- Validating claims
Stolen JWTs
- Dealing with stolen JWTs
- JWT storage
- Invalidating JWTs
Managing a Cryptographic Key
- Overview of secret keys
- Embedding the public key
- Embedding a URL containing the key
Hacking JWTs
- Brute force approach
- Modifying the algorithm RS256 to HS256
- None algorithm approach
Summary and Next Steps
Requirements
- Basic knowledge of web service
Audience
- Developers
Testimonials (5)
Belajar banyak tentang topik tersebut
Zsolt Langviser - Accenture Industrial SS
Course - NestJS: Beginner to Advanced
Machine Translated
The training has good content and easy to follow
David Phetole Leshabela - Vodacom SA
Course - React with Next.js
The breadth of the topis covered was quite a bit and the trainer tried to do justice to that.
Lakshmipriya Sivakumar - Deque Systems Inc
Course - Spring Boot, React, and Redux
trainer very knowledgeable clear classes explains the importance of learn the topic gives enough background on topic
Li Fang Bren Ong - DBS Bank Limited
Course - Ant Design
Although I had a pretty good knowledge of the subject already, I found out a lot useful stuff during the course.