Course Outline

Introduction

  • Overview of JWT Structure for Government
  • Common Use Cases for JWTs in Government Systems

JWT Validation for Government

  • Symmetric Token Signature Verification
  • Asymmetric Token Signature Verification
  • Token Validation Processes
  • Claim Validation Techniques

Addressing Stolen JWTs in Government Systems

  • Strategies for Handling Stolen JWTs
  • Secure Storage Practices for JWTs
  • Methods for Invalidating JWTs

Managing a Cryptographic Key for Government Use

  • Overview of Secret Keys in Government Systems
  • Embedding the Public Key in Tokens
  • Embedding a URL Containing the Key

Hacking JWTs: Security Considerations for Government

  • Brute Force Attack Methods
  • Algorithm Modification from RS256 to HS256
  • None Algorithm Exploitation Techniques

Summary and Next Steps for Government Implementation

Requirements

  • Fundamental understanding of web services

Audience

  • Software developers for government
 7 Hours

Number of participants


Price per participant

Testimonials (5)

Upcoming Courses

Related Categories