Event Looped logoEvent Looped
Practice
Learn
    • Scaling ReadsScaling WritesReal-time UpdatesDealing with ContentionMulti-step ProcessesHandling Large BlobsManaging Long-running TasksSecurity & Access Patterns
Interview Preparation

Security & Access Patterns

Authentication, authorization, and system protection — JWT vs sessions, OAuth 2.0, RBAC, API security, rate limiting for abuse prevention, and defense against common attack vectors.

Authentication

Master authentication patterns — OAuth 2.0 & OpenID Connect, JWT vs session tokens, token refresh strategies, and secure identity verification for modern APIs.

OAuth 2.0 & OIDCJWT vs Session TokensToken Refresh & RevocationAuth System Design

Protection

Secure systems from unauthorized access and attacks — API gateway authentication, DDoS mitigation, and data encryption at rest and in transit. Defense-in-depth for production systems.

API Gateway Auth & EnforcementDDoS MitigationData Encryption (At Rest & In Transit)