This internet browser is outdated and does not support all features of this site. Please switch or upgrade to a different browser to display this site properly.
The tutorial sessions at GECOST 2025 offer attendees the opportunity to deepen their knowledge on emerging topics and practical tools in the field. Led by experts from academia and industry, each tutorial is designed to be accessible, informative, and interactive.
Whether you are a newcomer seeking foundational insights or a practitioner looking to expand your skills, these sessions will provide valuable takeaways and hands-on learning.
Stay tuned for the full schedule and detailed descriptions of each tutorial.
Abstract:
In today’s complex threat landscape, effective cybersecurity relies on more than just static defenses. This hands-on tutorial equips participants with a practical, end-to-end skillset covering three critical domains: Cyber Threat Intelligence (CTI), Security Operations Center (SOC) workflows, and deep-dive network forensics. Participants will learn how to operationalize threat intelligence using real-world indicators, triage alerts in a simulated SOC environment, and decode packet-level data to uncover the root cause of incidents. Through live demonstrations using Wireshark, Security Onion, and Splunk, attendees will walk through a series of realistic attack scenarios and learn how to correlate logs, analyze packet captures, and extract actionable insights.
Key Learning Objectives
Upon completion of this workshop, participants will be able to:
Apply CTI to identify and contextualize Indicators of Compromise (IOCs) in real-world attack scenarios.
Simulate SOC workflows, including alert triage, log correlation, and incident escalation.
Perform packet-level analysis using Wireshark to investigate suspicious network behavior and detect anomalies.
Leverage Security Onion and Splunk for centralized log collection, threat detection, and forensic investigation.
Correlate threat intelligence, logs, and network traces to reconstruct multi-stage cyberattacks and formulate effective response strategies.