In today’s fast-evolving cybersecurity landscape, theory alone isn’t enough. Whether you’re a student, a SOC analyst, or an enterprise security leader—hands-on simulation is the only way to master real threats.
But how do you simulate a live attack, monitor it, and learn from it—without expensive hardware or risk to production systems?
🚀 Introducing the GNS3 + Wazuh + Docker Lab System
A modular, virtual cyber lab that combines three powerful tools into a single practical training and testing environment:
💡 Why This Lab Is a Game-Changer
| Tool | Role |
|---|---|
| GNS3 | Graphical network emulator: routers, switches, firewalls |
| Docker | Rapid deployment of web apps, Linux boxes, malware sims |
| Wazuh | SIEM/XDR: log monitoring, detection, threat hunting |
Together, they let you:
- Simulate a full enterprise network
- Deploy vulnerable applications or attacker nodes
- Monitor everything in real-time using industry-grade SIEM
- Detect brute-force attacks, lateral movement, malware signatures, and more
🔧 What’s Included
✔️ Preconfigured .gns3project file
✔️ Docker setup with attack + target containers
✔️ Wazuh agent integration (logs from containers and simulated endpoints)
✔️ Realistic scenarios: brute force, SQLi, ransomware, privilege escalation
✔️ Kibana dashboards + pre-tuned Wazuh rules
✔️ Wireshark-ready packet captures for analysis
🎯 Who It’s For
🔹 Cybersecurity Bootcamps & Universities – Add hands-on realism to your curriculum
🔹 SOC Teams & MSSPs – Test detection logic, practice threat response
🔹 Red Teamers & Pentesters – Validate TTPs and simulate C2
🔹 DevSecOps Teams – Test pipeline alerts and behavior monitoring
🔹 Self-Learners – Practice, break things, and learn in a safe environment
💼 Use Cases
- ✅ Train analysts to identify and respond to real-world threats
- ✅ Tune detection rules before deploying to production
- ✅ Simulate compliance violations and test alerting
- ✅ Demonstrate SIEM ROI to stakeholders
- ✅ Generate logs and behavior data for machine learning or forensic R\&D
🧪 Sample Lab Scenarios
| Scenario | Learn To Detect |
|---|---|
| Brute-force SSH login | Failed login patterns, alerting |
| Lateral movement from attacker | Host-to-host privilege escalation |
| SQL Injection on DVWA | Web log analysis, app firewall evasion |
| Reverse shell via Python | Unexpected outbound connections |
| Malware-infected container | File integrity + anomaly detection |
📦 Packages & Pricing
🧰 Starter Lab Kit (Self-hosted Download)
- GNS3 Project + Docker Compose
- Basic attacker + webapp scenarios
- Wazuh integration ready
- \$49 one-time
🧪 Pro Lab Bundle (For Teams & Bootcamps)
- 10+ ready-to-run scenarios
- Instructor guide + flags
- Kibana dashboards
- PDF writeups
- \$249 (bulk pricing available)
☁️ Fully Hosted Lab-as-a-Service (Coming soon!)
- Access in browser
- No setup required
- Team collaboration & scoring
- From \$29/month/user
🧠 Why It Works
Most cyber ranges are expensive, hard to set up, and require powerful hardware.
This lab uses Docker for agility, GNS3 for realistic topology, and Wazuh for detection — all on your local machine or remote server.
Train your team. Build your skills. Test your detections.
All with open-source tools and reusable, modular labs.
🔐 Ready to Simulate and Defend?
✅ Download now
✅ Customize for your environment
✅ Learn from real traffic and real logs
✅ Deploy anywhere — no cloud lock-in
📩 Want a demo? Need customization?
Email us at hello@simplico.net
🌐 Visit: https://www.simplico.net
🛡️ Learn to break it. Learn to detect it. Learn to defend it.
With GNS3 + Wazuh + Docker, the cyber battlefield is yours to master.
