Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction
- Overview of JWT Structure
- Common Use Cases for JWTs in Government Operations
JWT Validation for Government
- Symmetric Token Signature Verification
- Asymmetric Token Signature Verification
- Token Validation Procedures
- Claim Validation Requirements
Stolen JWTs and Security Measures for Government
- Strategies for Dealing with Stolen JWTs
- Secure Storage Practices for JWTs in Government Systems
- Methods for Invalidating JWTs to Ensure Data Integrity
Managing a Cryptographic Key for Government Use
- Overview of Secret Key Management
- Embedding the Public Key in Government Applications
- Embedding a URL Containing the Key for Enhanced Security
Hacking JWTs and Preventive Measures for Government
- Brute Force Attack Techniques
- Modifying the Algorithm from RS256 to HS256: Risks and Mitigation
- The None Algorithm Approach: Vulnerabilities and Countermeasures
Summary and Next Steps for Government Agencies
Requirements
- Fundamental understanding of web services for government
Audience
- Software Developers
7 Hours
Testimonials (4)
Hands on experiences
pawel kowala - Chemist4U
Course - React with Next.js
The lessons was very interactive and the excersices was good practical
Heino - NWK Limited
Course - Laravel and Vue.js
practice exercises
Mateusz - DPDgroup IT Solutions sp. z o.o.
Course - React Native for iOS and Android
The vue.js is something that I never worked with and the presentation clarified few of my doubts. But again, online courses are not efficient in acquiring knowledge.