01
Programming & Prompting
Python
Core Language
JavaScript
Web Logic
TypeScript
Typed JS
Shell / Bash
Terminal
API Requests
HTTP / JSON
File Handling
I/O
Async / Await
Concurrency
Prompt Engineering
AI Input Design
Multi-Agent Prompts
Coordination
Role Prompting
Persona Design
Chain-of-Thought
Reasoning Prompts
02
Basics of AI Agents
What Are AI Agents?
Foundations
Autonomous vs Semi
Agency Spectrum
Agent Architectures
ReAct, AutoGPT
Model Context Protocol
MCP
Goal Decomposition
Task Planning
Multi-Agent Collab
Agent Networks
Self-Reflection Loops
Feedback
Decision-Making
Policy Design
03
LLMs & APIs
OpenAI / GPT
Frontier Model
Claude
Anthropic
Gemini
Google
Mistral
Open Weight
Llama / DeepSeek
Open Source
Function Calling
Tool Use
Rate Limiting
API Throttling
Streaming Output
Token by Token
Context Window
Memory Limit
04
Tool Use & Integration
Tool Use System
Core Pattern
Memory Integration
State Persistence
External API Calling
3rd Party
File Reader / Writer
Data I/O
Python Execution
Code Interpreter
Search & Retrieval
Web + Vector
Web Browsing
Live Context
05
Agent Frameworks
LangChain
Orchestration
CrewAI
Role-based Agents
AutoGen
MS Framework
Flowise
Visual Builder
AgentOps
Monitoring
Haystack
NLP Pipelines
06
Memory Management
Short-Term Memory
Context Window
Long-Term Memory
Persistent Store
Episodic Memory
Event Recall
Vector Stores
Embeddings DB
Pinecone
Vector DB
ChromaDB
Local Vector
07
Knowledge & RAG
RAG
Retrieval-Augmented Gen
Embedding Models
Text → Vector
Document Indexing
Knowledge Base
Hybrid Search
Keyword + Vector
LangChain RAG
Framework Pattern
Chunking Strategy
Text Splitting
08
Deployment
API Deployment
FastAPI / Flask
Serverless Functions
Lambda / Edge
Docker
Containerization
Kubernetes
Orchestration
Agent Hosting
Replit, Modal
CI/CD Pipelines
Auto Deploy
09
Monitoring & Eval
Eval Metrics
Agent Scoring
LangSmith
Tracing & Debug
Human-in-the-Loop
Oversight
Logging & Tracing
Observability
01
Foundations
Python for Data
Core Language
Linear Algebra
Vectors & Matrices
Statistics Basics
Mean, Median, Std
Probability
Distributions
Calculus Basics
Derivatives & Gradients
SQL
Query Language
02
Data Wrangling
Pandas
DataFrames
NumPy
Arrays & Math
Data Cleaning
Null / Outlier Handling
Exploratory Analysis
EDA
Feature Engineering
Transform & Encode
Merging & Joining
DataFrame Ops
03
Visualization
Matplotlib
Core Plotting
Seaborn
Statistical Plots
Plotly
Interactive Charts
Data Storytelling
Narrative with Data
Dashboards
Tableau / Streamlit
04
Machine Learning
Scikit-Learn
ML Framework
Regression
Predict Numbers
Classification
Predict Categories
Clustering
Unsupervised
Decision Trees
Rule-Based Model
Random Forest / XGBoost
Ensemble Methods
Model Validation
Train / Test / CV
05
Deep Learning
Neural Networks
Layers & Weights
PyTorch
DL Framework
CNN
Image Recognition
RNN / LSTM
Sequence Models
Transformers
Attention Is All You Need
Backpropagation
Learning Algorithm
06
NLP
NLP Fundamentals
Text Processing
Tokenization
Text → Tokens
Sentiment Analysis
Positive / Negative
Word Vectors
Word2Vec / GloVe
Fine-Tuning LLMs
LoRA / PEFT
07
MLOps & Deployment
MLOps
ML in Production
MLflow
Experiment Tracking
Model Deployment
API / Endpoint
Model Monitoring
Drift Detection
Data Versioning
DVC
01
Foundations
Python for ML
NumPy · Pandas
Linear Algebra
Vectors & Matrices
Calculus & Gradients
Derivatives
Probability & Stats
Distributions
Git & Version Control
Reproducibility
Virtual Environments
Conda · Poetry
02
Core ML
Supervised Learning
Labels Required
Unsupervised Learning
No Labels
Reinforcement Learning
Reward & Policy
Loss Functions
MSE · Cross-Entropy
Optimizers
SGD · Adam
Regularization
Dropout · L1/L2
Bias–Variance Tradeoff
Over / Underfitting
03
Deep Learning
PyTorch
Tensors & Autograd
CNNs
Computer Vision
RNNs & LSTMs
Sequences
Transformers
Attention
Self-Attention
QKV Mechanism
Embeddings
Dense Representations
04
LLM Engineering
Pretraining
Next Token Prediction
Fine-Tuning
SFT · RLHF
LoRA / QLoRA
Parameter-Efficient
Quantization
INT4 · INT8
Tokenizers
BPE · WordPiece
Context Length
Positional Encoding
RLHF
Human Feedback
05
Training Infrastructure
GPU Computing
CUDA · cuDNN
Distributed Training
DDP · FSDP
Mixed Precision
FP16 · BF16
Checkpointing
Save & Resume
Training Profiling
Bottleneck Detection
06
Evaluation
Model Evaluation
Benchmarks
Perplexity
LLM Metric
BLEU / ROUGE
Text Generation Metrics
Human Evaluation
Preference Data
Hallucination Detection
Faithfulness
07
Production & MLOps
Model Serving
vLLM · TGI
Inference Optimization
Batching · KV Cache
Experiment Tracking
MLflow · W&B
Data & Model Drift
Monitoring
Feature Stores
Feast · Tecton
01
Foundations
CIA Triad
Confidentiality · Integrity · Availability
Networking Basics
TCP/IP · DNS · HTTP
OS Internals
Linux · Windows
Cryptography Basics
Symmetric · Asymmetric
Linux & Bash
Command Mastery
Python for Security
Scripting & Automation
02
Network Security
Firewalls & IDS/IPS
Traffic Control
Packet Analysis
Wireshark · tcpdump
VPNs & TLS
Encrypted Tunnels
Man-in-the-Middle
Interception Attacks
DoS / DDoS
Availability Attacks
Nmap & Recon
Network Scanning
03
Cryptography
AES Encryption
Symmetric Block Cipher
RSA / ECC
Public Key Crypto
Hashing
SHA-256 · bcrypt
PKI & Certificates
CA · TLS Certs
Steganography
Hidden Messages
04
Offensive Security
Penetration Testing
Ethical Hacking
Reconnaissance
OSINT · Footprinting
Exploitation
Metasploit · CVEs
SQL Injection
Database Attacks
XSS & CSRF
Web Vulnerabilities
Privilege Escalation
Root Access
05
Defensive Security
SOC Operations
Security Operations Center
SIEM
Splunk · Elastic
Incident Response
Triage & Recovery
Threat Intelligence
IOCs · TTPs
System Hardening
CIS Benchmarks
06
Web & App Security
OWASP Top 10
Web Vuln Standard
Burp Suite
Web Proxy & Scanner
Auth Vulnerabilities
Session · JWT Attacks
API Security
REST · GraphQL
SSRF & XXE
Server-Side Attacks
07
Malware & Forensics
Malware Analysis
Static · Dynamic
Reverse Engineering
Ghidra · IDA
Digital Forensics
Evidence & Chain of Custody
Ransomware
Encryption Attacks
08
Governance & Cloud
Zero Trust
Never Trust, Always Verify
Cloud Security
AWS · GCP · Azure
IAM
Identity & Access Mgmt
Compliance
SOC 2 · ISO 27001 · GDPR
Red vs Blue Team
Attack & Defend
Hub Node
Completed
To Learn