All paths
Security
Authentication & Security
Auth patterns production apps actually use.
Sessions vs tokens, refresh strategies, role-based access, and how identity flows through a real app — without re-inventing OAuth.
What you'll be able to do
- Pick the right auth model for the app you're building
- Design role-based access without making a mess
- Avoid the most common auth security mistakes
Your journey
Follow these in order — each step builds on the previous.
Finished the path?
Pick another track or apply what you learned by sketching out the architecture for a project of your own.