Web Development

  1. Deployment and Maintenance
    1. Web Hosting
      1. Shared Hosting
        1. Features and Limitations
        2. Virtual Private Server (VPS)
          1. Server Configuration
            1. Security Considerations
            2. Cloud Hosting
              1. AWS (Amazon Web Services)
                1. EC2
                  1. S3
                    1. Lambda
                    2. Google Cloud Platform (GCP)
                      1. Compute Engine
                        1. App Engine
                        2. Microsoft Azure
                          1. App Service
                            1. Virtual Machines
                          2. Platform as a Service (PaaS)
                            1. Heroku
                              1. Deployment Workflow
                              2. Vercel
                                1. Static and Serverless Deployment
                                2. Netlify
                                  1. Continuous Deployment
                              3. Continuous Integration/Continuous Deployment (CI/CD)
                                1. Principles of CI/CD
                                  1. Automation
                                    1. Testing and Deployment Pipelines
                                    2. Automated Pipelines
                                      1. Build Steps
                                        1. Test Steps
                                          1. Deployment Steps
                                          2. Tools
                                            1. GitHub Actions
                                              1. Jenkins
                                                1. GitLab CI
                                              2. Web Performance Optimization
                                                1. Asset Minification and Bundling
                                                  1. JavaScript and CSS Minification
                                                    1. Bundling Strategies
                                                    2. Caching Strategies
                                                      1. Browser Caching
                                                        1. Server-Side Caching
                                                          1. Cache-Control Headers
                                                          2. Image Optimization
                                                            1. Compression Techniques
                                                              1. Responsive Images
                                                              2. Content Delivery Networks (CDN)
                                                                1. How CDNs Work
                                                                  1. Benefits and Use Cases
                                                                  2. Measuring Performance
                                                                    1. Lighthouse
                                                                      1. WebPageTest
                                                                        1. Core Web Vitals
                                                                      2. Web Security Fundamentals
                                                                        1. Common Vulnerabilities
                                                                          1. Cross-Site Scripting (XSS)
                                                                            1. Types of XSS
                                                                              1. Prevention Techniques
                                                                              2. Cross-Site Request Forgery (CSRF)
                                                                                1. Attack Vectors
                                                                                  1. Prevention Techniques
                                                                                  2. SQL Injection
                                                                                    1. Attack Vectors
                                                                                      1. Prevention Techniques
                                                                                    2. Security Best Practices
                                                                                      1. Input Validation
                                                                                        1. Sanitization and Escaping
                                                                                        2. Using HTTPS
                                                                                          1. Enforcing Secure Connections
                                                                                          2. Environment Variable Management
                                                                                            1. Storing Secrets Securely
                                                                                              1. .env Files and Configuration