Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Linux Foundation

Attacking and Defending JWT Tokens - The Ultimate Guide

Linux Foundation via YouTube

Overview

Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Explore the world of JWT tokens in this comprehensive conference talk by Leo Juszkiewicz from Palo Alto Networks. Delve into the fundamentals of JWT tokens, including their functionality, historical context, and rise to prominence as a leading authentication mechanism in modern web applications. Discover how inadequate JWT verification methods can lead to authentication bypass vulnerabilities. Gain in-depth technical knowledge of common exploitation techniques and tactics, illustrated with real-world examples of successful attacks resulting in full account takeovers. Examine statistics and learn best practices for developers to effectively test, remediate, and validate JWT token security. Equip yourself with the ultimate guide to both attacking and defending JWT tokens in container-based web applications.

Syllabus

Attacking and Defending JWT Tokens: The Ultimate Guide - Leo Juszkiewicz, Palo Alto Networks

Taught by

Linux Foundation

Reviews

Start your review of Attacking and Defending JWT Tokens - The Ultimate Guide

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.