Dev Team Leadership
Practical, step-by-step guide for new dev team leads: what to do from day zero through delivery cycles, handling crises, and building momentum without the fluff.
Read study guide →Technical study guides on software development, architecture, and more
Practical leadership for dev team leads and managers
Leadership skills specific to software architects
Master the architect's leadership responsibilities: building effective teams, providing guidance, elastic leadership, negotiating with stakeholders, and integrating with development teams.
Read study guide →Master the architect's role in making decisions: frameworks for when to decide, antipatterns to avoid, what makes decisions architecturally significant, and how to capture them with ADRs.
Read study guide →Core SDLC concepts, phases, and methodology comparison
Core SDLC phases from planning through maintenance, CI/CD best practices, and modern development principles for delivering quality software.
Read study guide →Comprehensive comparison of software development methodologies including Waterfall, Agile (Scrum, Kanban, XP, Shape Up), Lean, DevOps, and specialized approaches with guidance on selection.
Read study guide →Modern team structures and collaboration patterns for software development, including domain-driven design, feature teams, and architectural governance.
Read study guide →Guiding discipline for architects: Align-Agree-Apply
A guiding discipline for architects that emphasizes human connection, shared agreement, and value delivery - transcending any specific SDLC methodology.
Read study guide →Understand the problem before committing to a solution.
Read study guide →Design the solution and secure commitment to the approach.
Read study guide →Execute with discipline while maintaining alignment.
Read study guide →Comprehensive guides to major software development methodologies
Comprehensive guide to Waterfall - sequential software development methodology for predictable, documentation-heavy, and highly regulated environments.
Read study guide →Comprehensive guide to Scrum - roles, ceremonies, artifacts, and practices for iterative software development with structure and empirical process control.
Read study guide →Comprehensive guide to Kanban - visualizing workflow, limiting WIP, optimizing flow, and continuous delivery through pull-based systems.
Read study guide →Comprehensive guide to Lean Software Development - principles, practices, and philosophy for eliminating waste, amplifying learning, and delivering value continuously.
Read study guide →Comprehensive guide to Extreme Programming (XP) - engineering practices, values, and disciplines for building high-quality software through technical excellence and continuous feedback.
Read study guide →Comprehensive guide to Shape Up methodology - Basecamp's approach to product development featuring six-week cycles, shaping, betting, and building phases.
Read study guide →CI/CD, deployment automation, and security integration
Comprehensive guide to DevOps - culture, practices, automation, and continuous delivery for breaking down silos and delivering value rapidly.
Read study guide →CI/CD fundamentals, pipeline design, automation strategies, security gates, testing approaches, and deployment workflows for modern software delivery.
Read study guide →DevSecOps philosophy and practices for making security everyone's responsibility throughout the SDLC, including shift-left security, security culture, and collaborative security practices.
Read study guide →Core concepts and principles of software architecture
Essential principles of software architecture including trade-off analysis, architectural thinking, the difference between architecture and design, and team organization patterns.
Read study guide →Understanding cohesion, coupling metrics, connascence, and strategies for managing component dependencies to build maintainable systems.
Read study guide →How to identify, select, measure, and govern the quality attributes that drive architectural decisions and determine system success.
Read study guide →Understanding the fallacies of distributed computing, architecture quantum concept, and how to decide between monolithic and distributed architectures.
Read study guide →Architectural styles from monolithic to distributed
Comprehensive overview comparing architectural styles from monolithic to distributed and guidance for selecting the right style for your system.
Read study guide →Technical layer-based monolithic architecture organizing systems by capability: presentation, business logic, persistence, and database layers.
Read study guide →Sequential data processing architecture using pipes and filters for ETL, data transformation, and stream processing workflows.
Read study guide →Plug-in based architecture separating core functionality from customizable extensions for product platforms and adaptable systems.
Read study guide →Domain-driven monolithic architecture partitioning by business capabilities while deploying as a single unit for operational simplicity.
Read study guide →Pragmatic distributed architecture with coarse-grained domain services balancing scalability and complexity.
Read study guide →Asynchronous event-based architecture enabling responsiveness, decoupling, and scalability through event brokers and reactive processors.
Read study guide →Fine-grained distributed architecture maximizing evolvability and independence through bounded contexts and service isolation.
Read study guide →Enterprise service architecture with ESB-based integration, service taxonomy, and orchestration for legacy system integration.
Read study guide →In-memory data grid architecture eliminating database bottlenecks for extreme elasticity and variable unpredictable load.
Read study guide →Architecture governance frameworks, processes, and tools
Principles, processes, and practices for governing software architecture decisions and ensuring alignment with business objectives
Read study guide →Enterprise architecture frameworks and governance approaches - when to use them and why
Read study guide →Practical tools and automation for implementing architecture governance - AWS, .NET, IaC, and security
Read study guide →Component design and risk analysis
Learn component design principles, bounded contexts, coupling types, logical vs physical architecture, and practical implementation strategies for distributed systems.
Read study guide →Comprehensive guide to Domain-Driven Design covering strategic design (bounded contexts, context mapping, ubiquitous language) and tactical design (entities, value objects, aggregates, repositories) for modeling complex business domains
Read study guide →Comprehensive guide to designing, architecting, and evolving APIs for distributed systems including REST, GraphQL, versioning strategies, and API governance
Read study guide →Comprehensive guide to testing distributed systems including test strategy patterns, contract testing, property-based testing, testing architectural characteristics, and testing in production
Read study guide →Comprehensive guide to performance engineering including requirements definition, profiling and analysis, optimization strategies, capacity planning, performance testing methodology, and architectural patterns for scalable systems
Read study guide →Visual modeling and diagramming techniques
Architectural and design patterns for distributed systems
Essential patterns for distributed service communication including load balancing, pub/sub, request-reply, circuit breaker, and retry strategies.
Read study guide →Reliable messaging patterns including transactional outbox/inbox, saga pattern, event sourcing, and message versioning for distributed systems.
Read study guide →Distributed coordination patterns including leader election, distributed locks, consensus algorithms, and managing shared resources across multiple nodes.
Read study guide →Compare centralized orchestration vs distributed choreography for coordinating complex business processes across multiple services with trade-offs and implementation patterns.
Read study guide →Essential integration patterns for connecting systems including pipes and filters, API gateway, service mesh, and data transformation strategies.
Read study guide →Database patterns for distributed systems including database-per-service, CQRS, event sourcing, saga pattern, and handling data consistency challenges.
Read study guide →Optimize system performance and scale with patterns for caching, throttling, load shedding, horizontal/vertical scaling, and partitioning strategies.
Read study guide →Build resilient systems with circuit breakers, retries, bulkheads, health checks, and graceful degradation patterns for handling failures.
Read study guide →Infrastructure patterns including sidecar, ambassador, anti-corruption layer, blue-green deployment, and canary releases for robust deployment strategies.
Read study guide →Comprehensive guide to modernizing legacy systems including strangler fig pattern, anti-corruption layers, incremental migration techniques, risk mitigation, and decision frameworks for brownfield vs greenfield approaches
Read study guide →Comprehensive guide to service mesh architecture covering core concepts, patterns, when to adopt, service mesh vs API gateway, and implementation considerations for AWS ECS (App Mesh) and EKS (Istio, Linkerd)
Read study guide →Database fundamentals, data processing, and modern data architectures
Cost analysis, ROI, and financial aspects of architecture
Understanding and calculating the complete cost of technology solutions over their entire lifecycle, including hidden costs and optimization strategies.
Read study guide →Measuring financial returns from technology investments, including ROI calculation methods, benefit quantification, and decision frameworks for architecture decisions.
Read study guide →Core security concepts and principles
Master fundamental security concepts including the CIA triad, defense-in-depth principles, trust models, and security-by-design practices for building secure systems.
Read study guide →Comprehensive overview of security frameworks including NIST CSF 2.0, OWASP standards, ISO 27000 series, CIS Controls, and MITRE ATT&CK.
Read study guide →Practical security best practices covering network segmentation, endpoint protection, IAM, data encryption, application security, and 2025 security trends.
Read study guide →Understanding and defending against security threats
Explore threat actor classifications from script kiddies to nation-states, vulnerability management with CVE and CVSS, and risk assessment methodologies.
Read study guide →Understand contemporary cyber threats including social engineering, phishing variants, injection attacks, advanced persistent threats, and ransomware with prevention strategies.
Read study guide →Implement defense-in-depth strategies, zero trust architecture principles, access control models, and network security fundamentals for comprehensive protection.
Read study guide →Securing applications and data
Comprehensive guide to secure development lifecycle, threat modeling methodologies including STRIDE and PASTA, and essential secure coding practices for robust applications.
Read study guide →Comprehensive coverage of data classification, encryption for data at rest/in transit/in use, privacy regulations like GDPR and HIPAA, and data loss prevention strategies.
Read study guide →Master security testing methodologies including SAST, DAST, IAST, penetration testing phases, and vulnerability assessment techniques for comprehensive application security.
Read study guide →Compliance, incident response, and governance
Essential framework for risk management, compliance standards like SOX and PCI DSS, security auditing processes, and continuous monitoring strategies.
Read study guide →Learn the NIST incident response lifecycle including preparation, detection, containment, eradication, recovery, and post-incident analysis with team structure and communication strategies.
Read study guide →Explore security challenges in AI/ML, cloud computing, IoT devices, blockchain smart contracts, and quantum computing's impact on cryptography.
Read study guide →Comprehensive catalog of security assessment tools, vulnerability scanners, SIEM platforms, threat intelligence resources, and compliance automation tools.
Read study guide →Core data structures and complexity analysis
Build practical intuition for algorithm complexity from O(1) to O(2ⁿ), with rules for analysis, space complexity fundamentals, and common misconceptions debunked.
Read study guide →Deep dive into mathematical foundations of algorithm analysis covering Big O, Omega, and Theta notations with detailed examples and practical analysis techniques.
Read study guide →Quick reference for time and space complexity of common data structures, algorithms, and operations with practical guidelines for algorithm selection and performance optimization.
Read study guide →Practical guide for choosing the right data structure and algorithm for your problem, comparing interview practices with production best practices.
Read study guide →Master four fundamental algorithm design approaches: dynamic programming, greedy algorithms, divide-and-conquer, and backtracking with practical examples and complexity analysis.
Read study guide →Arrays, lists, stacks, and queues
Master static and dynamic arrays with O(1) access, amortized analysis, common techniques like two pointers and sliding window, and essential interview problems.
Read study guide →Learn singly and doubly linked lists with implementations, time complexity analysis, and common interview problems including cycle detection and reversal.
Read study guide →Master stack (LIFO) and queue (FIFO) data structures with implementations, common applications like BFS, and variations including priority queues and circular queues.
Read study guide →Tree structures and heap-based data structures
Learn tree fundamentals including terminology, types, traversal methods, and why trees enable logarithmic time operations for hierarchical data structures.
Read study guide →Comprehensive guide to binary search trees covering implementation, traversal algorithms, search operations, and understanding when to use tree structures.
Read study guide →Master advanced tree structures including tries for prefix matching, segment trees, balanced trees like AVL and Red-Black, and specialized applications.
Read study guide →Learn heap data structure properties, heapify operations, priority queue implementations, and applications from task scheduling to finding top-K elements.
Read study guide →Graph structures and algorithms
Foundation of graph theory covering terminology, representations, graph types, and basic traversal concepts for modeling complex relationships and networks.
Read study guide →Complete guide to graphs covering representations, traversal algorithms (BFS/DFS), and applications from social networks to pathfinding problems.
Read study guide →Advanced graph algorithms including Dijkstra's shortest path, topological sorting, minimum spanning trees, and network flow problems with practical implementations.
Read study guide →Hashing, searching, sorting, and recursion
Master hash tables with O(1) average lookups, collision resolution strategies, hash function design, and practical applications from caching to frequency counting.
Read study guide →Compare linear and binary search algorithms with complexity analysis, when to use each approach, and implementing efficient search strategies.
Read study guide →Comprehensive guide to sorting algorithms from bubble sort to quick sort, with complexity comparisons, stability analysis, and practical selection criteria.
Read study guide →Master recursive thinking with base cases, recursive cases, common patterns, memoization techniques, and converting between recursive and iterative solutions.
Read study guide →Core object-oriented concepts and principles
Master the four pillars of object-oriented programming: abstraction, encapsulation, inheritance, and polymorphism with practical C# examples and modern best practices.
Read study guide →Deep dive into SOLID principles: Single Responsibility, Open/Closed, Liskov Substitution, Interface Segregation, and Dependency Inversion with practical examples.
Read study guide →Modern OOP practices including composition over inheritance, dependency injection, immutability, functional programming concepts, and avoiding common antipatterns.
Read study guide →Quick reference guide to all design patterns organized by category with purpose, use cases, and practical guidance for pattern selection.
Read study guide →Gang of Four design patterns and their applications
Creational design patterns including Builder, Factory Method, Abstract Factory, Singleton, and Prototype with modern C# implementations and best practices.
Read study guide →Structural design patterns including Adapter, Bridge, Composite, Decorator, Facade, Flyweight, and Proxy for flexible object composition.
Read study guide →Behavioral design patterns for object communication including Observer, Strategy, Command, Template Method, Chain of Responsibility, and State patterns.
Read study guide →System monitoring and observability fundamentals
Build observable systems with the three pillars: distributed logging, metrics monitoring, and distributed tracing, plus profiling and best practices.
Read study guide →Advanced observability patterns including distributed tracing strategies, SLO/SLI frameworks, sampling techniques, cardinality management, OpenTelemetry adoption, and observability-driven development for production systems
Read study guide →Well-Architected Framework and architectural decision-making
IAM, Identity Center, Organizations, and security controls
VPC, subnets, routing, PrivateLink, and network connectivity
VPC fundamentals for architects including subnets, routing, security groups, NACLs, and multi-AZ and multi-VPC patterns for building secure and scalable network architectures.
Read study guide →Comprehensive guide to AWS Route 53 covering DNS routing policies, health checks, traffic management, failover strategies, cost optimization, and global traffic distribution
Read study guide →Comprehensive guide to AWS CloudFront covering CDN architecture, edge locations, caching strategies, Lambda@Edge vs CloudFront Functions, Origin Shield, security, cost optimization, and global content delivery
Read study guide →Comprehensive guide to AWS Elastic Load Balancing covering ALB, NLB, and GWLB comparison, target groups, health checks, TLS termination, cross-zone load balancing, cost optimization, and deployment patterns
Read study guide →Comprehensive guide to AWS API Gateway covering REST vs HTTP APIs, authorization mechanisms, throttling and rate limiting, caching strategies, cost optimization, and integration patterns
Read study guide →Comprehensive guide to AWS Direct Connect and Site-to-Site VPN covering hybrid connectivity options, resiliency patterns, high availability architectures, cost analysis, and when to use each solution
Read study guide →Comprehensive guide to AWS PrivateLink and Transit Gateway covering private service connectivity, multi-VPC architectures, hub-and-spoke patterns, cost comparison with VPC peering, and scaling strategies
Read study guide →EC2, Lambda, ECS, EKS, and compute service selection
Comprehensive guide to AWS EC2 instance selection, cost optimization, security, high availability, and architectural patterns for system architects
Read study guide →Comprehensive guide to AWS Lambda covering event-driven patterns, performance optimization, cost strategies, security, and when to use serverless vs alternatives
Read study guide →Comprehensive guide to AWS container orchestration covering ECS, EKS, Fargate, cost optimization, deployment patterns, and service selection frameworks
Read study guide →S3, EBS, EFS, and storage architecture patterns
Comprehensive guide to AWS S3 covering storage classes, cost optimization, security, performance, and architectural patterns for system architects
Read study guide →Comprehensive guide to AWS EBS and EFS covering volume types, file systems, performance optimization, cost management, and when to use block vs file storage
Read study guide →RDS, DynamoDB, Aurora, and database selection
Comprehensive guide to AWS RDS and Aurora covering database engines, high availability, performance optimization, Aurora Serverless, cost management, and when to use RDS vs Aurora
Read study guide →Comprehensive guide to AWS DynamoDB covering partition key design, capacity modes, indexes, single-table design, DynamoDB Streams, cost optimization, and when to use NoSQL vs relational databases
Read study guide →Comprehensive guide to AWS ElastiCache covering Redis vs Memcached, cluster modes, caching strategies, ElastiCache Serverless, cost optimization, and high availability patterns
Read study guide →Comprehensive guide to AWS Redshift covering Serverless vs provisioned clusters, RA3 node types, distribution and sort keys, Redshift Spectrum, cost optimization, and data warehousing best practices
Read study guide →Comprehensive decision framework for selecting the right AWS database service (RDS/Aurora, DynamoDB, ElastiCache, Redshift) based on workload characteristics, performance requirements, and cost constraints
Read study guide →CloudFormation for infrastructure automation and management
Core CloudFormation concepts including stacks, templates, resources, and basic workflow for managing AWS infrastructure as code.
Read study guide →Complete reference for CloudFormation intrinsic functions, parameters, outputs, mappings, and conditions with practical examples.
Read study guide →Change sets, nested stacks, StackSets, custom resources, drift detection, and best practices for production CloudFormation deployments.
Read study guide →Complete guide for migrating resources to CloudFormation: importing unmanaged resources, moving resources between stacks, and stack refactoring with the latest AWS solutions.
Read study guide →SQS, SNS, EventBridge, Step Functions, Kinesis, and messaging patterns
Comprehensive guide to AWS SQS and SNS covering queue types, pub/sub patterns, fanout architecture, dead letter queues, cost optimization, and messaging best practices for decoupled systems
Read study guide →Comprehensive guide to AWS EventBridge covering event buses, rules, targets, EventBridge Pipes and Scheduler, event-driven architecture patterns, SNS comparison, and cost optimization for building scalable serverless applications
Read study guide →Comprehensive guide to AWS Step Functions covering Standard and Express workflows, state types, error handling, orchestration vs choreography patterns, service integrations, and cost optimization for building resilient distributed applications
Read study guide →Comprehensive guide to AWS Kinesis covering Data Streams and Firehose for real-time streaming, sharding strategies, scaling patterns, cost optimization, and comparison with SQS for event processing
Read study guide →Threat detection, security posture, compliance monitoring, and encryption
Comprehensive guide to AWS Security Hub and GuardDuty covering threat detection, security posture management, findings aggregation, integration patterns, automated remediation, and cost optimization for defense-in-depth security
Read study guide →Comprehensive guide to AWS CloudTrail and Config covering audit logging, compliance monitoring, organizational trails, configuration change tracking, and cost optimization for governance and security
Read study guide →Comprehensive guide to AWS WAF and Shield covering web application firewall, DDoS protection, managed rules, rate limiting, bot control, and cost optimization for application and network layer defense
Read study guide →Comprehensive guide to AWS KMS and Secrets Manager covering encryption key management, automatic secret rotation, envelope encryption, Parameter Store comparison, and cost optimization for data protection
Read study guide →Comprehensive guide to AWS Organizations and Control Tower covering multi-account strategy, organizational units, service control policies, guardrails, landing zones, and governance best practices for enterprise AWS deployments
Read study guide →Monitoring, observability, systems management, and cost optimization
Comprehensive guide to AWS CloudWatch covering metrics, alarms, dashboards, Logs Insights, cross-account observability, and cost optimization strategies for monitoring and operational excellence
Read study guide →Comprehensive guide to AWS X-Ray covering distributed tracing, service maps, trace analysis, integration patterns, performance optimization, and troubleshooting strategies for microservices architectures
Read study guide →Comprehensive guide to AWS Systems Manager covering Session Manager, Patch Manager, Parameter Store, Run Command, State Manager, automation, fleet management, and operational best practices
Read study guide →Comprehensive guide to AWS cost management covering Cost Explorer, Budgets, Compute Optimizer, Trusted Advisor, Savings Plans, Reserved Instances, and cost optimization strategies for achieving financial efficiency at scale
Read study guide →CI/CD pipelines, build automation, and deployment orchestration
Comprehensive guide to AWS CodePipeline and CodeBuild covering pipeline orchestration, build automation, cross-account deployments, integration patterns, cost optimization, and CI/CD best practices
Read study guide →Comprehensive guide to AWS CodeDeploy covering deployment strategies, blue/green deployments, canary releases, rollback mechanisms, integration with EC2/Lambda/ECS, and deployment automation best practices
Read study guide →Comprehensive guide to AWS Cloud Development Kit (CDK) covering infrastructure as code with programming languages, constructs, stacks, comparison with CloudFormation, integration patterns, and best practices for TypeScript, Python, and other supported languages
Read study guide →ETL, data lakes, serverless analytics, and BI tools
ETL job orchestration, data crawlers, schema discovery, and serverless data transformation at scale
Read study guide →Serverless SQL queries on S3 data lakes with partition optimization, cost control, and performance tuning strategies
Read study guide →BI dashboards, SPICE in-memory engine, embedded analytics, ML-powered insights, and cost-effective visualization at scale
Read study guide →Data lake patterns, service selection frameworks, data warehouse vs lake house architectures, and integration strategies
Read study guide →SageMaker ML platform and AWS AI services for production workloads
ML model training, deployment, endpoints, SageMaker Studio, cost optimization, and service selection for production ML workloads
Read study guide →Image and video analysis with Rekognition, document intelligence with Textract, use cases, and cost optimization
Read study guide →Natural language processing with Comprehend, real-time translation with Translate, sentiment analysis, entity extraction, and multilingual applications
Read study guide →Speech-to-text, text-to-speech, voice synthesis, real-time transcription, and audio processing use cases
Read study guide →Decision framework for choosing between SageMaker, AI services, and custom ML solutions based on use case, expertise, and cost
Read study guide →Cloud migration strategies, planning, and execution best practices
The 6 Rs migration framework, AWS Cloud Adoption Framework, migration planning, and best practices for successful cloud migrations
Read study guide →AWS MGN for application rehosting, AWS DMS for database migrations, homogeneous and heterogeneous migrations, and migration best practices
Read study guide →Hybrid cloud connectivity options including Direct Connect, VPN, Storage Gateway, and Outposts with decision frameworks and cost analysis
Read study guide →Serverless patterns, event-driven design, and production best practices
Event-driven patterns, CQRS, saga orchestration, observability, cost optimization, and anti-patterns for serverless applications on AWS
Read study guide →AWS SAM templates, local testing, deployment pipelines, and comparison with AWS CDK for serverless infrastructure as code
Read study guide →Advanced container patterns, security, and service mesh architectures
Comprehensive guide to AWS Elastic Container Registry and container security covering image scanning, lifecycle policies, replication, runtime security, and secrets management
Read study guide →Comprehensive guide to advanced ECS and EKS patterns covering service discovery, capacity providers, service mesh, autoscaling, and multi-cluster architectures
Read study guide →Multi-region architectures and disaster recovery strategies
Comprehensive guide to multi-region AWS architectures covering active-active, active-passive, data replication, Route 53 routing, and cost optimization
Read study guide →Comprehensive guide to disaster recovery on AWS covering RTO/RPO targets, backup strategies, pilot light, warm standby, multi-site, and cost optimization
Read study guide →Multi-cloud IaC fundamentals, tools, patterns, and best practices
Core IaC concepts including declarative vs. imperative approaches, idempotency, immutability, and why IaC matters for modern infrastructure.
Read study guide →Comprehensive comparison of IaC tools including CloudFormation, Terraform, Pulumi, Ansible, and others to help choose the right tool for your needs.
Read study guide →Modular design, environment separation, layered architecture, and GitOps workflow patterns for organizing IaC code effectively.
Read study guide →Understanding infrastructure state, remote backends, state locking, and best practices for managing IaC state across teams.
Read study guide →Managing environment recreation, resource discovery, and handling mutable vs. immutable identifiers when recreating infrastructure.
Read study guide →Static analysis, unit testing, integration testing, and compliance testing strategies for infrastructure code.
Read study guide →Enforcing tagging standards, automated drift detection, compliance monitoring, and governance at scale using AWS Config, Organizations, and automation.
Read study guide →Deployment strategies, disaster recovery, and operational resilience
Deployment strategies define how new versions of applications are released to production environments. Learn about Rolling, Blue-Green, Canary, A/B Testing deployments, and Chaos Engineering.
Read study guide →Business continuity strategies from backup-and-restore to multi-site hot-standby, comparing RTO/RPO requirements, costs, and implementation approaches for disaster recovery.
Read study guide →Core ML concepts and techniques
Comprehensive ML fundamentals covering supervised/unsupervised learning, model training, neural networks, MLOps practices, and 2025 industry trends.
Read study guide →Generative AI including popular tools, prompt engineering techniques, transformer architectures, RAG systems, and practical integration strategies for 2025.
Read study guide →Essential programming concepts and terminology that underpin C# and modern software development
Essential programming concepts and terminology that form the foundation for understanding C# and modern software development
Read study guide →How .NET compiles and executes code: IL, JIT, AOT, tiered compilation, trimming, and deployment models
Read study guide →Core C# language features: types, operators, control flow, methods, and more
Understanding C#'s type system including value types, reference types, type inference, and memory behavior.
Read study guide →Complete guide to C# operators from arithmetic basics to modern pattern matching, null handling, and expression-bodied members.
Read study guide →Conditionals, loops, and branching in C# including modern switch expressions and pattern-based control flow.
Read study guide →Method declarations, parameter passing mechanisms, expression-bodied members, local functions, and modern method features.
Read study guide →Delegates, events, multicast delegates, built-in delegate types, and the event pattern in C#.
Read study guide →String manipulation, StringBuilder, string interpolation, formatting, parsing, and high-performance text processing.
Read study guide →Exception handling, custom exceptions, error patterns, and best practices for robust error management.
Read study guide →Attributes for metadata, reflection for runtime type inspection, and practical patterns for metaprogramming.
Read study guide →Understanding the .NET garbage collector, memory allocation, generations, finalization, and best practices for efficient memory usage.
Read study guide →Classes, structs, records, interfaces, inheritance, and properties
Understanding classes, structs, and records in C# including when to use each, initialization patterns, and best practices.
Read study guide →Interfaces, inheritance hierarchies, polymorphism, and default interface implementations in modern C#.
Read study guide →Properties, auto-properties, computed properties, indexers, and modern initialization patterns in C#.
Read study guide →Modern C# features: nullable types, pattern matching, and records
Nullable reference types, null safety annotations, and patterns for eliminating null reference exceptions in C#.
Read study guide →Comprehensive guide to pattern matching in C# from type patterns to list patterns, with practical examples and best practices.
Read study guide →Records, immutable patterns, with expressions, and designing for immutability in modern C#.
Read study guide →Asynchronous programming, parallel processing, streaming, and synchronization
Asynchronous programming with async/await, Task-based patterns, cancellation, and best practices for I/O-bound operations.
Read study guide →Parallel processing, concurrent collections, thread synchronization, and CPU-bound work in C#.
Read study guide →IAsyncEnumerable, System.IO.Pipelines, channels, and high-performance streaming patterns.
Read study guide →Thread synchronization with locks, semaphores, mutexes, and signaling mechanisms for safe concurrent programming.
Read study guide →Collections, generics, Span, Memory, and high-performance data handling
Arrays, lists, dictionaries, sets, spans, and choosing the right collection for your use case.
Read study guide →Generic types, methods, constraints, variance, and building reusable type-safe components.
Read study guide →Zero-allocation programming with Span
Essential .NET libraries: LINQ, Entity Framework, DI, networking, configuration, logging, and common utilities
Language Integrated Query (LINQ) fundamentals, query operations, deferred execution, and practical patterns.
Read study guide →Entity Framework Core fundamentals including DbContext, queries, relationships, migrations, and performance best practices.
Read study guide →Console input/output, formatting, colors, environment variables, and binary serialization.
Read study guide →Microsoft.Extensions.DependencyInjection, service lifetimes, registration patterns, and DI best practices.
Read study guide →HttpClient patterns, IHttpClientFactory, resilience, REST APIs, and modern networking best practices.
Read study guide →In-memory caching, distributed caching, cache strategies, and best practices for performance optimization.
Read study guide →Application configuration with IConfiguration, strongly-typed options, secrets management, and configuration providers.
Read study guide →Structured logging with ILogger, log levels, scopes, providers, and high-performance logging patterns.
Read study guide →JSON serialization with System.Text.Json including configuration, custom converters, and source generation.
Read study guide →Pattern matching with System.Text.RegularExpressions including common patterns, groups, replacements, and source generation.
Read study guide →Timer types in .NET, periodic execution, and scheduling patterns for background work.
Read study guide →File and directory operations with System.IO including reading, writing, paths, and async file handling.
Read study guide →Hashing, encryption, and secure random generation with System.Security.Cryptography.
Read study guide →Source generators, unsafe code, expression trees, and native interop
Compile-time code generation for boilerplate reduction, performance optimization, and metaprogramming without runtime reflection.
Read study guide →Direct memory manipulation with pointers, fixed buffers, and interop scenarios requiring unsafe code in C#.
Read study guide →Building and manipulating code as data structures with expression trees for dynamic queries, metaprogramming, and runtime code generation.
Read study guide →Calling native code from C# with P/Invoke, LibraryImport, COM interop, and marshaling techniques.
Read study guide →