Hacking and Securing JSON Web Tokens (JWT)
Hacking and Securing JSON Web Tokens (JWT), available at $54.99, has an average rating of 4.3, with 31 lectures, based on 608 reviews, and has 4077 subscribers.
You will learn about Students will get Indepth knowledge about Json Web Tokens (JWT) Students will learn JWT Implementation Weaknesses Students will learn various practical JWT Attacks Students will learn how to securing JWT Implementations Students will learn how to do JWT based REST API Security testing Students will learn how HS256 and RS256 Algorithms work Students will learn how Hash Based Message Authentication Code (HMAC) works Students will learn how RSA Digital Signatures work Students will learn how to use openssl command line client to practice Cryptographic algorithms This course is ideal for individuals who are Penetration Testers or Web or API Developers or Mobile Application Developers or Security professionals who are interested in REST API Security or Security professionals who are interested in JWT Security or Anyone who is interested in ethical hacking and penetration testing or Anyone who is interested in information security concepts It is particularly useful for Penetration Testers or Web or API Developers or Mobile Application Developers or Security professionals who are interested in REST API Security or Security professionals who are interested in JWT Security or Anyone who is interested in ethical hacking and penetration testing or Anyone who is interested in information security concepts.
Enroll now: Hacking and Securing JSON Web Tokens (JWT)
Summary
Title: Hacking and Securing JSON Web Tokens (JWT)
Price: $54.99
Average Rating: 4.3
Number of Lectures: 31
Number of Published Lectures: 31
Number of Curriculum Items: 31
Number of Published Curriculum Objects: 31
Original Price: $199.99
Quality Status: approved
Status: Live
What You Will Learn
- Students will get Indepth knowledge about Json Web Tokens (JWT)
- Students will learn JWT Implementation Weaknesses
- Students will learn various practical JWT Attacks
- Students will learn how to securing JWT Implementations
- Students will learn how to do JWT based REST API Security testing
- Students will learn how HS256 and RS256 Algorithms work
- Students will learn how Hash Based Message Authentication Code (HMAC) works
- Students will learn how RSA Digital Signatures work
- Students will learn how to use openssl command line client to practice Cryptographic algorithms
Who Should Attend
- Penetration Testers
- Web or API Developers
- Mobile Application Developers
- Security professionals who are interested in REST API Security
- Security professionals who are interested in JWT Security
- Anyone who is interested in ethical hacking and penetration testing
- Anyone who is interested in information security concepts
Target Audiences
- Penetration Testers
- Web or API Developers
- Mobile Application Developers
- Security professionals who are interested in REST API Security
- Security professionals who are interested in JWT Security
- Anyone who is interested in ethical hacking and penetration testing
- Anyone who is interested in information security concepts
This course teaches various insecure implementations of Json Web Token (JWT) based REST APIs. This course begins by introducing students to the fundamental Json Web Token concepts. Even though, this is an entry level to intermediate level course, we encourage you to take this course if you already have basic Web Security knowledge as this course is designed to provide knowledge specific to Json Web Tokens and it does not cover the fundamentals of Web Security Testing and REST API Security Testing. Do note that the course involves a lot of JWT fundamental concepts and only the last module covers the practical attacks against JWT. So, please get your expectation right before jumping on the course. Rest Assured, you will feel confident about Json Web Tokens and JWT Security testing after completing this course.
As a bonus, a Virtual Machine is provided with all the source code used in the labs. So, you can change the code to have few more vulnerable implementations of JWT.
Course Curriculum
Chapter 1: Course Introduction
Lecture 1: Introduction
Chapter 2: Introduction to JWT
Lecture 1: Lab setup
Lecture 2: Custom Vulnerable APIs – Download
Lecture 3: What is JWT?
Lecture 4: JWT Structure
Lecture 5: Base64 vs Base64url encoding
Lecture 6: A word about JWT Signature
Lecture 7: How JWT works?
Lecture 8: API Documentation – Download
Lecture 9: JWT Demo
Lecture 10: Summary
Chapter 3: JWT indepth
Lecture 1: JWT Headers
Lecture 2: JWT Payload
Lecture 3: JWT Signature
Lecture 4: Understanding HS256
Lecture 5: HS256 Demo
Lecture 6: Understanding RS256
Lecture 7: RS256 Demo
Lecture 8: None Algorithm Demo
Chapter 4: JWT – Command line Kung-Fu
Lecture 1: Manually creating HS256 Signature
Lecture 2: Generating RSA Keys using Openssl
Lecture 3: Manually creating RS256 Signature
Chapter 5: JWT Attacks and Defenses
Lecture 1: Introduction
Lecture 2: Abusing None Algorithm – Demo
Lecture 3: Abusing None Algorithm using Burpsuite – Demo
Lecture 4: Signature Stripping Attack – Demo
Lecture 5: Bruteforcing HS256 Secret Key – Demo
Lecture 6: Substitution Attack – Demo
Lecture 7: Defenses
Chapter 6: Conclusion
Lecture 1: Conclusion
Chapter 7: bonus section
Lecture 1: Bonus lecture
Instructors
-
Srinivas .
Your instructor
Rating Distribution
- 1 stars: 3 votes
- 2 stars: 14 votes
- 3 stars: 65 votes
- 4 stars: 223 votes
- 5 stars: 303 votes
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
You may also like
- Top 10 Language Learning Courses to Learn in November 2024
- Top 10 Video Editing Courses to Learn in November 2024
- Top 10 Music Production Courses to Learn in November 2024
- Top 10 Animation Courses to Learn in November 2024
- Top 10 Digital Illustration Courses to Learn in November 2024
- Top 10 Renewable Energy Courses to Learn in November 2024
- Top 10 Sustainable Living Courses to Learn in November 2024
- Top 10 Ethical AI Courses to Learn in November 2024
- Top 10 Cybersecurity Fundamentals Courses to Learn in November 2024
- Top 10 Smart Home Technology Courses to Learn in November 2024
- Top 10 Holistic Health Courses to Learn in November 2024
- Top 10 Nutrition And Diet Planning Courses to Learn in November 2024
- Top 10 Yoga Instruction Courses to Learn in November 2024
- Top 10 Stress Management Courses to Learn in November 2024
- Top 10 Mindfulness Meditation Courses to Learn in November 2024
- Top 10 Life Coaching Courses to Learn in November 2024
- Top 10 Career Development Courses to Learn in November 2024
- Top 10 Relationship Building Courses to Learn in November 2024
- Top 10 Parenting Skills Courses to Learn in November 2024
- Top 10 Home Improvement Courses to Learn in November 2024