YoVDO

Attacking and Defending JWT Tokens - The Ultimate Guide

Offered By: Linux Foundation via YouTube

Tags

Web Application Security Courses Cybersecurity Courses Container Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the world of JWT tokens in this comprehensive conference talk by Leo Juszkiewicz from Palo Alto Networks. Delve into the fundamentals of JWT tokens, including their functionality, historical context, and rise to prominence as a leading authentication mechanism in modern web applications. Discover how inadequate JWT verification methods can lead to authentication bypass vulnerabilities. Gain in-depth technical knowledge of common exploitation techniques and tactics, illustrated with real-world examples of successful attacks resulting in full account takeovers. Examine statistics and learn best practices for developers to effectively test, remediate, and validate JWT token security. Equip yourself with the ultimate guide to both attacking and defending JWT tokens in container-based web applications.

Syllabus

Attacking and Defending JWT Tokens: The Ultimate Guide - Leo Juszkiewicz, Palo Alto Networks


Taught by

Linux Foundation

Tags

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network