Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ ZENODOarrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
ZENODO
Dataset
Data sources: ZENODO
addClaim

IMPROVING THE METHODOLOGY OF TEACHING INFORMATION SECURITY TO STUDENTS USING SOFTWARE TOOLS

Authors: Ibragimov Ulugbek Muradilloyeivch; Amonov Baxtiyor Olimovich;

IMPROVING THE METHODOLOGY OF TEACHING INFORMATION SECURITY TO STUDENTS USING SOFTWARE TOOLS

Abstract

This article examines the current state and prospects of improving the methodology of teaching information security to students through the active use of specialized software tools. Modern educational institutions face the challenge of bridging the gap between theoretical knowledge and practical skills required in the information security field. The research analyzes widely used platforms such as Kali Linux, Wireshark, GNS3, Metasploit Framework, and OWASP WebGoat, and proposes an integrated laboratory-based teaching approach that combines real-world attack and defense scenarios. A comparative evaluation of traditional lecture-based instruction versus software-enhanced practical training was conducted on the basis of Asia International University, Bukhara. The experimental results demonstrate a statistically significant improvement in students' competency levels, critical thinking, and readiness for professional activity when the proposed methodology is applied. The study also addresses the ethical and security considerations of using penetration testing tools in an academic environment.

Powered by OpenAIRE graph
Found an issue? Give us feedback