Course Outline
Introduction
- Overview of JWT structure
- JWT common use cases
JWT Validation
- Symmetric token signature
- Asymmetric token signature
- Validating tokens
- Validating claims
Stolen JWTs
- Dealing with stolen JWTs
- JWT storage
- Invalidating JWTs
Managing a Cryptographic Key
- Overview of secret keys
- Embedding the public key
- Embedding a URL containing the key
Hacking JWTs
- Brute force approach
- Modifying the algorithm RS256 to HS256
- None algorithm approach
Summary and Next Steps
Requirements
- Basic knowledge of web service
Audience
- Developers
Testimonials (5)
Provided with nestjs even though it was not on the agenda
Suhail - Maldives Pension Administration Office (Pension Office)
Course - Typescript Unit Testing
Demonstrating non-obvious and non-intuitive behaviors/functionalities through examples.
Arkadiusz Prochwicz
Course - Advanced TypeScript
Machine Translated
Simplification of new complex techniques
Brian Zaranyika - Vodacom SA
Course - React Native Expo
The breadth of the topis covered was quite a bit and the trainer tried to do justice to that.
Lakshmipriya Sivakumar - Deque Systems Inc
Course - Spring Boot, React, and Redux
Comparing practical solutions :D Illustrating things with real examples. Additionally, I highly appreciate the preparation of the API, databases, and tasks for us, which allowed us to test everything "in the field" :D
Mateusz Redzik - BETFAN SP. Z O. O.
Course - React with Next.js
Machine Translated