Cross-Cutting Engineering Tracks
These five tracks run across multiple semesters. They are not separate phases -- they should become habits integrated into your daily engineering practice.
Track A: Testing & Verification
note
Starts in Semester 0. The roadmap should not produce someone who can design systems but cannot prove changes are safe.
Progression by Semester
| Semester | Skills | Expected Practice |
|---|---|---|
| 0-2 | Unit tests, assertions, basic test organization, regression mindset | Every exercise has tests |
| 3 | Testable design, seam creation for refactoring, characterization tests | Refactors are protected by tests |
| 4-5 | Integration tests, concurrency/system tests, database tests | Major systems have integration checks |
| 6-7 | Contract tests, API tests, architecture fitness checks | Design docs include verification strategy |
| 8-9 | Cloud environment tests, infrastructure validation, E2E production verification | Deployed systems have test suites |
| 10 | Full test strategy on capstone project | Capstone has comprehensive test coverage |
Outputs by Degree End
- Every meaningful project has tests
- Refactors are always protected by tests
- Major systems have integration and E2E checks
- Design docs include verification strategy
Track B: Git, CI/CD & Release Engineering
note
Starts in Semester 0. A project-heavy roadmap without disciplined collaboration and delivery practice is incomplete.
Progression by Semester
| Semester | Skills | Expected Practice |
|---|---|---|
| 0-1 | Commits, branches, merge/rebase basics, PR hygiene | Git-based workflow from week 1 |
| 2-3 | Code review habits, commit discipline, automated lint/test pipelines | PRs with review notes |
| 4-5 | Build automation, release workflows, artifact/version management | Projects have CI |
| 6-8 | Trunk-based or branch-based strategy tradeoffs, deployment safety, rollback | Release notes exist |
| 9 | Infrastructure-as-code versioning, deployment pipelines | Full CI/CD pipeline |
| 10 | Full release engineering on capstone | Production deployment with rollback |
Core Resources
- Pro Git
- Software Engineering at Google
- GitHub Actions documentation
Outputs by Degree End
- Each project uses version control professionally
- Each substantial project has CI
- Release notes and rollback plans exist for production-style systems
Track E: Engineering Fundamentals
note
Starts in Semester 0. Strong engineers need command-line fluency, debugging discipline, and the ability to read technical documentation without being handheld.
Progression by Semester
| Semester | Skills | Expected Practice |
|---|---|---|
| 0-1 | Terminal basics, filesystem fluency, editor workflow, reading technical docs, simple debugging | Every repo task can be done from terminal and notes include command evidence |
| 2-3 | Runtime inspection, tracing logic errors, profiling basics, technical writing for implementations | Algorithm and design work includes debugging notes and short design explanations |
| 4-5 | Linux workflow, compiler/build output, memory debugging, network inspection, shell-first debugging | Systems projects are traced, inspected, and explained with command-line evidence |
| 6-8 | Performance investigation, design-doc writing, ADR literacy, operational debugging | Major projects include written decisions and debugging/performance notes |
| 9-10 | Production debugging, logs/metrics-driven investigation, runbooks, docs-first operations | Capstone includes runbooks, troubleshooting notes, and production-style diagnosis |
Outputs by Degree End
- The learner is comfortable working from terminal, editor, and docs rather than only GUI flows
- Major projects include debugging notes, performance notes, or troubleshooting records
- Design decisions are written clearly enough for another engineer to follow
- Official documentation is used directly in tooling-heavy phases
Track C: Security Engineering
warning
Starts in Semester 4. Security should not appear only at the end of the roadmap.
Progression by Semester
| Semester | Skills | Expected Practice |
|---|---|---|
| 4 | Memory safety awareness, undefined behavior, input validation, secure coding basics | Secure coding checklist for C code |
| 5 | Network security fundamentals, auth basics, transport security, attack surface awareness | Security review on networked projects |
| 6-7 | Data security, secrets handling, access control, threat modeling, API security | Threat model for major projects |
| 8 | Security reviews, architecture risks, reliability/security tradeoffs, incident readiness | Security checklist in architecture reviews |
| 9-10 | Cloud security posture, IAM design, supply chain security, infrastructure hardening | Capstone security review |
Outputs by Degree End
- Threat model for major projects
- Secure defaults in APIs and services
- Security checklist attached to architecture reviews
Track D: Observability, Reliability & SRE
note
Starts in Semester 5. Systems engineering includes knowing whether a system is healthy, not just how to build it.
Progression by Semester
| Semester | Skills | Expected Practice |
|---|---|---|
| 5 | Logs, metrics, traces, basic monitoring | Service projects expose telemetry |
| 6 | Reliability thinking, failure modes, backpressure, recovery behavior | Failure-mode analysis in projects |
| 7-8 | SLIs, SLOs, error budgets, alert design, incident response, postmortems | At least one project has an SLO |
| 9 | Cloud-native observability, managed monitoring, infrastructure health | Observability dashboard |
| 10 | Full observability stack on capstone, production dashboards, operational readiness | Capstone has monitoring and alerting |
Reference Concepts
- Service Level Indicators (SLIs)
- Service Level Objectives (SLOs)
- Error budgets
- Incident response
- Postmortem culture
Outputs by Degree End
- Every service project exposes health and telemetry
- At least one major project has an SLO and alerting model
- Postmortem templates are used for failures found during projects