Course Outline
Introduction
- Overview of JWT Structure
- Common Use Cases for JWTs in Government Operations
JWT Validation for Government
- Symmetric Token Signature Verification
- Asymmetric Token Signature Verification
- Token Validation Procedures
- Claim Validation Requirements
Stolen JWTs and Security Measures for Government
- Strategies for Dealing with Stolen JWTs
- Secure Storage Practices for JWTs in Government Systems
- Methods for Invalidating JWTs to Ensure Data Integrity
Managing a Cryptographic Key for Government Use
- Overview of Secret Key Management
- Embedding the Public Key in Government Applications
- Embedding a URL Containing the Key for Enhanced Security
Hacking JWTs and Preventive Measures for Government
- Brute Force Attack Techniques
- Modifying the Algorithm from RS256 to HS256: Risks and Mitigation
- The None Algorithm Approach: Vulnerabilities and Countermeasures
Summary and Next Steps for Government Agencies
Requirements
- Fundamental understanding of web services for government
Audience
- Software Developers
Testimonials (5)
The Trainor gives more samples which really helps a lot.
Romulo - Tribal Software Philippines, Inc.
Course - Advanced TypeScript
The training has good content and easy to follow
David Phetole Leshabela - Vodacom SA
Course - React with Next.js
Simplification of new complex techniques
Brian Zaranyika - Vodacom SA
Course - React Native Expo
The breadth of the topis covered was quite a bit and the trainer tried to do justice to that.
Lakshmipriya Sivakumar - Deque Systems Inc
Course - Spring Boot, React, and Redux
The trainer seemed very knowledgable about Vue. I appreciated seeing his development style and learning some new concepts to try.