- How Internet Works
- HTTP
- Domain Name
- Hosting
- DNS
- Browser and How the work
- NAT (Network Address Translation)
- IPv4 vs IPv6
- MTU & packet fragmentation
- Keep-alive connections
- Connection pooling at TCP level
- TIME_WAIT / CLOSE_WAIT states
- Processes vs Threads - Done
- Context switching - Done
- Virtual memory
- File systems - Done
- Syscalls
- Signals
- Scheduling
- Deadlocks & starvation
- OSI MODEL
- FTP
- SFTP
- DNS
- TCP
- UDP
- RPC
- HTTP / HTTPS
- SSL / TLS
- SSH
- Email Protocols
- How latency actually happens
- Packet loss
- Retries & timeouts
- Idempotency
- JavaScript - Done
- TypeScript - Done
- Golang - Done
- Python
- Rust
- React.js
- Next.js
- Node.js
- Nest.JS
- Gin
- NAT (Network Address Translation)
- IPv4 vs IPv6
- MTU & packet fragmentation
- Keep-alive connections
- Connection pooling at TCP level
- TIME_WAIT / CLOSE_WAIT states
- Request lifecycle
- Thread pools vs event loop
- Connection lifecycle
- Memory allocation patterns
- Backpressure propagation
- Streaming responses
- Graceful shutdown
- Hot reload vs cold restart
- REST
- JSON API
- gRPC
- GraphQL
- OPEN API Specs
- API versioning strategies
- Backward compatibility
- Schema evolution
- Breaking vs non-breaking changes
- Consumer-driven contracts
- Attribute Based Access Control (ABAC)
- Discretionary Access Control (DAC)
- Policy-Based Access Control (PBAC)
- Role-Based Access Control (RBAC)
- Mandatory Access Control (MAC)
- Relationship-Based Access Control (ReBAC)
- Token-based authentication
- JSON Web Tokens
- OAuth 2.0
- Session Based Authentication
- Auth threat modeling
- Token revocation strategies
- Refresh token rotation
- Zero-trust architecture
- Service-to-service authentication (mTLS)
- Caching Strategies
- Profiling and monitoring
- Performance Testing
- Error Handling / Retries
- MD5
- SHA
- scrypt
- bcrypt
- OWASP (Open Web Application Security Project) Risks
- CORS (Cross-Origin Resource Sharing)
- SSL / TLS - cryptographic protocols
- CSP (Content Security Policy)
- Server Security
- OAuth2, OpenID Connect
- SQL injection & XSS
- CSRF
- Secrets management
- Encryption basics (AES, RSA)
- Rate limiting strategies
- Bot protection
- Replay attacks
- Timing attacks
- Security headers deep dive
- Git and GitHub
- MySQL
- MongoDB
- PostgreSQL
- Firebase
- Neo 4j
- Migration
- N +1 Problem
- Transection
- ORM
- ACID
- ORM
- Normalization
- Isolation levels
- Indexes (B-Tree, GIN, Hash)
- Query planner
- Joins & execution plans
- Locks & deadlocks
- Failure Modes
- Profiling Performance
- Database Indexes
- Data Replication
- Sharding Strategies
- Read replicas
- Connection pooling
- CAP Theorem
- Write amplification
- Read amplification
- Hot partitions
- Online schema migrations
- Multi-region databases
- Data consistency across services
- Soft deletes vs hard deletes
- Caching Strateges
- Redis
- HTTP Caching
- Cache invalidation strategies (deep dive)
- Cache stampede
- Write-through / write-back
- Read-through vs lazy loading
- Consistency vs performance tradeoffs
- NGINX
- Forward Proxy
- Reverse Proxy
- Caching Server
- Firewall
- Load Balancer
- L4 vs L7 load balancing
- Health checks
- Blue-green & canary routing
- Rate limiting at gateway level
- AWS
- Serverless
- Infrastructure as Code (Terraform mindset)
- Secrets rotation
- Multi-region deployments
- Disaster recovery
- Backup & restore strategies
- Cost optimization (FinOps basics)
- Integration Testing
- Unit Testing
- Functional Testing
- Contract testing
- Load / stress testing
- Chaos testing
- Test data management
- Testing in distributed systems
- Docker
- Kubernetes
- Jenkins
- GitHub Actions
- Deployment strategies
- Blue-green
- Canary
- Rolling
- Feature flags
- Rollback strategies
- RabbitMQ
- Kafka (conceptual at least)
- Event ordering
- At-least-once vs exactly-once
- Consumer groups
- Idempotent consumers
- Event schema versioning
- Elastic search
- Monolith
- Micro Service
- SOA (Service-Oriented Architecture)
- Serverless
- Event-driven architecture
- CQRS
- Hexagonal / Clean Architecture
- DDD (practical, not academic)
- Twelve-Factor App methodology
- Server Sent Event
- Web Sockets
- Long / Short Polling
- Instrumentation
- Monitoring
- Telemetry
- Logging strategies
- Prometheus
- OpenTelemetry
- Distributed tracing
- RED / USE metrics
- Alert fatigue management
- SLO-driven alerting
- Graceful Degradation
- Throttling
- Back pressure
- Load Shifting
- Circuit Breaker
- CAP theorem (proper understanding)
- Consistency models
- Consensus (Raft, Paxos basics)
- Leader election
- Service discovery
- Distributed locks
- Eventual consistency
- Idempotency at scale
- Circuit breaker
- Retry with backoff
- Bulkhead
- Saga pattern
- Two-phase commit
- Clock skew
- Time synchronization (NTP)
- Split-brain scenarios
- Quorum-based systems
- Gossip protocols
- Twelve-Factor App
- LLM fundamentals
- Tokenization
- Embeddings
- Vector databases
- RAG architecture
- Prompt engineering (structured)
- Tool calling & agents
- Model evaluation
- AI security (prompt injection)
- Cost & latency optimization
- GenAI observability