Course Outline

Introduction

  • Overview of JWT Structure
  • Common Use Cases for JWTs in Government Operations

JWT Validation for Government

  • Symmetric Token Signature Verification
  • Asymmetric Token Signature Verification
  • Token Validation Procedures
  • Claim Validation Requirements

Stolen JWTs and Security Measures for Government

  • Strategies for Dealing with Stolen JWTs
  • Secure Storage Practices for JWTs in Government Systems
  • Methods for Invalidating JWTs to Ensure Data Integrity

Managing a Cryptographic Key for Government Use

  • Overview of Secret Key Management
  • Embedding the Public Key in Government Applications
  • Embedding a URL Containing the Key for Enhanced Security

Hacking JWTs and Preventive Measures for Government

  • Brute Force Attack Techniques
  • Modifying the Algorithm from RS256 to HS256: Risks and Mitigation
  • The None Algorithm Approach: Vulnerabilities and Countermeasures

Summary and Next Steps for Government Agencies

Requirements

  • Fundamental understanding of web services for government

Audience

  • Software Developers
 7 Hours

Number of participants


Price per participant

Testimonials (5)

Upcoming Courses

Related Categories