Course Outline
Introduction
- Overview of JWT Structure for Government
- Common Use Cases for JWTs in Government Systems
JWT Validation for Government
- Symmetric Token Signature Verification
- Asymmetric Token Signature Verification
- Token Validation Processes
- Claim Validation Techniques
Addressing Stolen JWTs in Government Systems
- Strategies for Handling Stolen JWTs
- Secure Storage Practices for JWTs
- Methods for Invalidating JWTs
Managing a Cryptographic Key for Government Use
- Overview of Secret Keys in Government Systems
- Embedding the Public Key in Tokens
- Embedding a URL Containing the Key
Hacking JWTs: Security Considerations for Government
- Brute Force Attack Methods
- Algorithm Modification from RS256 to HS256
- None Algorithm Exploitation Techniques
Summary and Next Steps for Government Implementation
Requirements
- Fundamental understanding of web services
Audience
- Software developers for government
Testimonials (5)
The Trainor gives more samples which really helps a lot.
Romulo - Tribal Software Philippines, Inc.
Course - Advanced TypeScript
The training has good content and easy to follow
David Phetole Leshabela - Vodacom SA
Course - React with Next.js
Simplification of new complex techniques
Brian Zaranyika - Vodacom SA
Course - React Native Expo
The breadth of the topis covered was quite a bit and the trainer tried to do justice to that.
Lakshmipriya Sivakumar - Deque Systems Inc
Course - Spring Boot, React, and Redux
The trainer seemed very knowledgable about Vue. I appreciated seeing his development style and learning some new concepts to try.