There come times where an Information Security Consultant may have to deal with a program, vulnerability, or even an operating system that you haven't made contact with before. Times like that is where an essential item in a consultant's toolbox needs to be utilization. A lab!