Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction
- Overview of JWT Structure
- Common Use Cases for JWTs in Government Operations
JWT Validation for Government
- Symmetric Token Signature Verification
- Asymmetric Token Signature Verification
- Token Validation Procedures
- Claim Validation Requirements
Stolen JWTs and Security Measures for Government
- Strategies for Dealing with Stolen JWTs
- Secure Storage Practices for JWTs in Government Systems
- Methods for Invalidating JWTs to Ensure Data Integrity
Managing a Cryptographic Key for Government Use
- Overview of Secret Key Management
- Embedding the Public Key in Government Applications
- Embedding a URL Containing the Key for Enhanced Security
Hacking JWTs and Preventive Measures for Government
- Brute Force Attack Techniques
- Modifying the Algorithm from RS256 to HS256: Risks and Mitigation
- The None Algorithm Approach: Vulnerabilities and Countermeasures
Summary and Next Steps for Government Agencies
Requirements
- Fundamental understanding of web services for government
Audience
- Software Developers
7 Hours
Testimonials (4)
The details amout, way of explaning and the calm and confidence the trainer is inspiring.
Cosmin Ghergheles - Ness
Course - React, Redux and TypeScript
The Trainor gives more samples which really helps a lot.
Romulo - Tribal Software Philippines, Inc.
Course - Advanced TypeScript
I like the professionality of the trainer, he really knows what he is talking about and able to explain almost even the simple subjects on the topic which is great.
Marlon - National Confederation of Cooperatives
Course - React with Next.js
practice exercises