IMPROVING THE METHODOLOGY OF TEACHING INFORMATION SECURITY TO STUDENTS USING SOFTWARE TOOLS

Authors

  • Ibragimov Ulugbek Muradilloyeivch, Amonov Baxtiyor Olimovich Bukhara state technical university , Internal affairs department Bukhrara region

Keywords:

Information security, cybersecurity education, software tools, Kali Linux, Wireshark, penetration testing, laboratory methodology, practical training, competency-based learning, Metasploit.

Abstract

This article examines the current state and prospects of improving the methodology of teaching information security to students through the active use of specialized software tools. Modern educational institutions face the challenge of bridging the gap between theoretical knowledge and practical skills required in the information security field. The research analyzes widely used platforms such as Kali Linux, Wireshark, GNS3, Metasploit Framework, and OWASP WebGoat, and proposes an integrated laboratory-based teaching approach that combines real-world attack and defense scenarios. A comparative evaluation of traditional lecture-based instruction versus software-enhanced practical training was conducted on the basis of Asia International University, Bukhara. The experimental results demonstrate a statistically significant improvement in students' competency levels, critical thinking, and readiness for professional activity when the proposed methodology is applied. The study also addresses the ethical and security considerations of using penetration testing tools in an academic environment.

Downloads

Download data is not yet available.

References

Bishop, M. (2003). Computer Security: Art and Science. Addison-Wesley Professional. 1084 p.

Conklin, W. A. (2006). Cyber defense competitions and information security education: An active learning solution for a capstone course. Proceedings of the 39th Hawaii International Conference on System Sciences. IEEE. pp. 1–9.

Andreolini, M., Colajanni, M., Marchetti, M. (2015). A collaborative framework for intrusion detection in mobile networks. Information Sciences, vol. 321, pp. 179–192.

Kali Linux Documentation. (2024). Official Kali Linux documentation. Offensive Security. Available at: https://www.kali.org/docs/

Nance, K., Bishop, M., Hay, B. (2009). Virtual machine introspection: Observation or interference? IEEE Security & Privacy, vol. 6(5), pp. 32–37.

GNS3 Technologies Inc. (2024). GNS3 Network Simulator — Documentation and user guide. Available at: https://docs.gns3.com/

Ibragimov, U. (2025). Application of the Harrington method in the food industry. Journal of Applied Science and Social Science, 1(3), pp. 544–549.

Ibragimov Ulugbek Muradilloyevich. Rainbow table threat and defense mechanisms. Journal of Applied Science and Social Science. Volume 15, Issue 10, October 2025. pp. 280–287.

OWASP Foundation. (2023). OWASP WebGoat Project. Available at: https://owasp.org/www-project-webgoat/

Hake, R. R. (1998). Interactive-engagement versus traditional methods: A six-thousand-student survey of mechanics test data for introductory physics courses. American Journal of Physics, 66(1), pp. 64–74.

Downloads

Published

2026-03-31

How to Cite

Ibragimov Ulugbek Muradilloyeivch, Amonov Baxtiyor Olimovich. (2026). IMPROVING THE METHODOLOGY OF TEACHING INFORMATION SECURITY TO STUDENTS USING SOFTWARE TOOLS. Journal of Applied Science and Social Science, 16(03), 1194–1198. Retrieved from https://www.internationaljournal.co.in/index.php/jasass/article/view/3889