Learn through what you love.
Username
Password
🏀 Sports Lens
FREE · 0 / 10
🔥 0 day streak
0 / 0
01
Programming & Prompting
🐍
Python
Core Language
JavaScript
Web Logic
📘
TypeScript
Typed JS
💻
Shell / Bash
Terminal
🔗
API Requests
HTTP / JSON
📁
File Handling
I/O
Async / Await
Concurrency
✍️
Prompt Engineering
AI Input Design
🤝
Multi-Agent Prompts
Coordination
🎭
Role Prompting
Persona Design
🧩
Chain-of-Thought
Reasoning Prompts
02
Basics of AI Agents
🤖
What Are AI Agents?
Foundations
🧠
Autonomous vs Semi
Agency Spectrum
🏗️
Agent Architectures
ReAct, AutoGPT
🔌
Model Context Protocol
MCP
🎯
Goal Decomposition
Task Planning
🔄
Multi-Agent Collab
Agent Networks
🪞
Self-Reflection Loops
Feedback
⚖️
Decision-Making
Policy Design
03
LLMs & APIs
🟢
OpenAI / GPT
Frontier Model
🟠
Claude
Anthropic
💎
Gemini
Google
🌪️
Mistral
Open Weight
🦙
Llama / DeepSeek
Open Source
🛠️
Function Calling
Tool Use
⏱️
Rate Limiting
API Throttling
📡
Streaming Output
Token by Token
🪟
Context Window
Memory Limit
04
Tool Use & Integration
⚙️
Tool Use System
Core Pattern
🧩
Memory Integration
State Persistence
🌐
External API Calling
3rd Party
📄
File Reader / Writer
Data I/O
▶️
Python Execution
Code Interpreter
🔍
Search & Retrieval
Web + Vector
🌍
Web Browsing
Live Context
05
Agent Frameworks
🔗
LangChain
Orchestration
👥
CrewAI
Role-based Agents
🔁
AutoGen
MS Framework
🌊
Flowise
Visual Builder
📊
AgentOps
Monitoring
🌾
Haystack
NLP Pipelines
06
Memory Management
Short-Term Memory
Context Window
🗄️
Long-Term Memory
Persistent Store
📼
Episodic Memory
Event Recall
📐
Vector Stores
Embeddings DB
🌲
Pinecone
Vector DB
🎨
ChromaDB
Local Vector
07
Knowledge & RAG
📚
RAG
Retrieval-Augmented Gen
🔢
Embedding Models
Text → Vector
🗂️
Document Indexing
Knowledge Base
🔀
Hybrid Search
Keyword + Vector
⛓️
LangChain RAG
Framework Pattern
✂️
Chunking Strategy
Text Splitting
08
Deployment
🚀
API Deployment
FastAPI / Flask
☁️
Serverless Functions
Lambda / Edge
🐳
Docker
Containerization
⚙️
Kubernetes
Orchestration
🏠
Agent Hosting
Replit, Modal
🔄
CI/CD Pipelines
Auto Deploy
09
Monitoring & Eval
📈
Eval Metrics
Agent Scoring
🔭
LangSmith
Tracing & Debug
👤
Human-in-the-Loop
Oversight
📋
Logging & Tracing
Observability
01
Foundations
🐍
Python for Data
Core Language
Linear Algebra
Vectors & Matrices
📊
Statistics Basics
Mean, Median, Std
🎲
Probability
Distributions
📉
Calculus Basics
Derivatives & Gradients
🗃️
SQL
Query Language
02
Data Wrangling
🐼
Pandas
DataFrames
🔢
NumPy
Arrays & Math
🧹
Data Cleaning
Null / Outlier Handling
🔎
Exploratory Analysis
EDA
⚗️
Feature Engineering
Transform & Encode
🔗
Merging & Joining
DataFrame Ops
03
Visualization
📈
Matplotlib
Core Plotting
🌊
Seaborn
Statistical Plots
Plotly
Interactive Charts
📖
Data Storytelling
Narrative with Data
🖥️
Dashboards
Tableau / Streamlit
04
Machine Learning
🤖
Scikit-Learn
ML Framework
📏
Regression
Predict Numbers
🏷️
Classification
Predict Categories
🫧
Clustering
Unsupervised
🌳
Decision Trees
Rule-Based Model
🌲
Random Forest / XGBoost
Ensemble Methods
Model Validation
Train / Test / CV
05
Deep Learning
🧠
Neural Networks
Layers & Weights
🔥
PyTorch
DL Framework
👁️
CNN
Image Recognition
🔂
RNN / LSTM
Sequence Models
Transformers
Attention Is All You Need
↩️
Backpropagation
Learning Algorithm
06
NLP
💬
NLP Fundamentals
Text Processing
✂️
Tokenization
Text → Tokens
😊
Sentiment Analysis
Positive / Negative
📍
Word Vectors
Word2Vec / GloVe
🎛️
Fine-Tuning LLMs
LoRA / PEFT
07
MLOps & Deployment
⚙️
MLOps
ML in Production
🧪
MLflow
Experiment Tracking
🚀
Model Deployment
API / Endpoint
📡
Model Monitoring
Drift Detection
📦
Data Versioning
DVC
01
Foundations
🐍
Python for ML
NumPy · Pandas
Linear Algebra
Vectors & Matrices
📉
Calculus & Gradients
Derivatives
📊
Probability & Stats
Distributions
🌿
Git & Version Control
Reproducibility
📦
Virtual Environments
Conda · Poetry
02
Core ML
🏷️
Supervised Learning
Labels Required
🫧
Unsupervised Learning
No Labels
🎮
Reinforcement Learning
Reward & Policy
📏
Loss Functions
MSE · Cross-Entropy
⛰️
Optimizers
SGD · Adam
🔒
Regularization
Dropout · L1/L2
⚖️
Bias–Variance Tradeoff
Over / Underfitting
03
Deep Learning
🔥
PyTorch
Tensors & Autograd
👁️
CNNs
Computer Vision
🔂
RNNs & LSTMs
Sequences
Transformers
Attention
🔦
Self-Attention
QKV Mechanism
🔢
Embeddings
Dense Representations
04
LLM Engineering
🏗️
Pretraining
Next Token Prediction
🎛️
Fine-Tuning
SFT · RLHF
🧬
LoRA / QLoRA
Parameter-Efficient
🗜️
Quantization
INT4 · INT8
✂️
Tokenizers
BPE · WordPiece
🪟
Context Length
Positional Encoding
🧭
RLHF
Human Feedback
05
Training Infrastructure
🖥️
GPU Computing
CUDA · cuDNN
🌐
Distributed Training
DDP · FSDP
🔀
Mixed Precision
FP16 · BF16
💾
Checkpointing
Save & Resume
📡
Training Profiling
Bottleneck Detection
06
Evaluation
🧪
Model Evaluation
Benchmarks
Perplexity
LLM Metric
🔵
BLEU / ROUGE
Text Generation Metrics
👥
Human Evaluation
Preference Data
👻
Hallucination Detection
Faithfulness
07
Production & MLOps
🚀
Model Serving
vLLM · TGI
Inference Optimization
Batching · KV Cache
🧫
Experiment Tracking
MLflow · W&B
📉
Data & Model Drift
Monitoring
🗄️
Feature Stores
Feast · Tecton
01
Foundations
🔐
CIA Triad
Confidentiality · Integrity · Availability
🌐
Networking Basics
TCP/IP · DNS · HTTP
💻
OS Internals
Linux · Windows
🔑
Cryptography Basics
Symmetric · Asymmetric
🖥️
Linux & Bash
Command Mastery
🐍
Python for Security
Scripting & Automation
02
Network Security
🧱
Firewalls & IDS/IPS
Traffic Control
🦈
Packet Analysis
Wireshark · tcpdump
🔒
VPNs & TLS
Encrypted Tunnels
🕵️
Man-in-the-Middle
Interception Attacks
🌊
DoS / DDoS
Availability Attacks
🗺️
Nmap & Recon
Network Scanning
03
Cryptography
🔐
AES Encryption
Symmetric Block Cipher
🗝️
RSA / ECC
Public Key Crypto
#️⃣
Hashing
SHA-256 · bcrypt
📜
PKI & Certificates
CA · TLS Certs
🖼️
Steganography
Hidden Messages
04
Offensive Security
⚔️
Penetration Testing
Ethical Hacking
🔭
Reconnaissance
OSINT · Footprinting
💥
Exploitation
Metasploit · CVEs
💉
SQL Injection
Database Attacks
📜
XSS & CSRF
Web Vulnerabilities
⬆️
Privilege Escalation
Root Access
05
Defensive Security
🏰
SOC Operations
Security Operations Center
📡
SIEM
Splunk · Elastic
🚨
Incident Response
Triage & Recovery
🧠
Threat Intelligence
IOCs · TTPs
🛡️
System Hardening
CIS Benchmarks
06
Web & App Security
🕸️
OWASP Top 10
Web Vuln Standard
🔍
Burp Suite
Web Proxy & Scanner
🔓
Auth Vulnerabilities
Session · JWT Attacks
🔗
API Security
REST · GraphQL
🔄
SSRF & XXE
Server-Side Attacks
07
Malware & Forensics
🦠
Malware Analysis
Static · Dynamic
🔬
Reverse Engineering
Ghidra · IDA
🕵️
Digital Forensics
Evidence & Chain of Custody
💀
Ransomware
Encryption Attacks
08
Governance & Cloud
🚦
Zero Trust
Never Trust, Always Verify
☁️
Cloud Security
AWS · GCP · Azure
🪪
IAM
Identity & Access Mgmt
📋
Compliance
SOC 2 · ISO 27001 · GDPR
🔴
Red vs Blue Team
Attack & Defend
Hub Node
Completed
To Learn