Home Lab Environments

Controlled lab environments used to validate security monitoring, detection workflows, and infrastructure experiments.

Security Lab Topology

Lab Security Network

This lab simulates a small enterprise security monitoring environment. It is designed for testing detection rules, endpoint visibility, and incident workflows in a controlled setting.

Modem → Firewall → Router → Switches → KVM Switch → Endpoints
                                  ├─ Windows (Workstation)
                                  ├─ macOS (Workstation)
                                  ├─ Kali Linux (Testing / Security Tools)
                                  └─ Raspberry Pi (Wazuh Agent / collectors)

Security Monitoring Stack (Ubuntu Server)
  ├─ Wazuh Manager
  ├─ Elasticsearch
  └─ Kibana

Focus: endpoint telemetry, log collection, alerting, and repeatable security testing scenarios.

Monitoring Workflow

SIEM Logs Dashboards

Outcome: improved detection tuning, reduced false positives, and repeatable incident simulations.

SOAR Integration

SOAR Response Automation

A SOAR platform should sit next to the SIEM and consume alerts from Wazuh/Elastic. In this lab, the SOAR tool would run either on the Ubuntu Server (if resources allow) or on a separate lightweight VM/host to keep workflows isolated and stable.

How it works across this setup

Goal: reduce time-to-triage by automating repetitive steps while keeping actions controlled and auditable.

Planned Lab Scenarios

Testing Detection Ops