LinkedIn Profile
Wade Bachelder Resume
Wade Bachelder PowerShell
Black Cat White Hat Security
Contact Wade Bachelder
Site Title
Please view my website and ask me any questions.
The information on this site is shared with OpenAI.

Wade Bachelder Profile Photo A dedicated, passionate, and accomplished application developer and multi-hat information systems security engineer, specializing in cybersecurity defense and Governance, Risk, and Compliance (GRC). With a proven track record of successfully managing the full lifecycle of various systems, networks, and databases. Proficient in programming languages such as ColdFusion, SQL and PowerShell. My expertise lies in cybersecurity and data privacy compliance and am known for producing effective strategies that enhance system performance and security while ensuring adherence to regulatory standards.

I am advancing my expertise in cybersecurity through a comprehensive education, and as part of this commitment, I have leveraged the resources offered by Infosec Institute. By enrolling in classes from industry-leading organizations like Infosec, NIST, ISACA, and (ISC)2, I am continuously enhancing my knowledge and skills in the field of cybersecurity and privacy.
Since November 2022, I have diligently pursued my cybersecurity education, earning a remarkable collection of continued education certificates issued by Infosec. My journey has led me through 83 learning paths (72 Displayed), where I have engaged with over 600 hours of videos, assessments, and exams. These learning experiences have not only deepened my understanding but have also honed my practical abilities, enabling me to excel in the ever-evolving landscape of cybersecurity.
With each milestone achieved, I have embraced the challenges with enthusiasm and a determination to stay ahead in the field. My unwavering commitment to continuous learning demonstrates my passion for cybersecurity and my dedication to being at the forefront of the industry's best practices.

Advanced Intrusion Detection

AWS Certified Security Specialist

Azure Secure Engineer Associate

Certificate of Cloud Security Knowledge (CCSK)

Certified Authorization Professional (CAP)

Certified CMMC Professional

Certified in Risk and Information Systems Control (CRISC)

Certified Information Privacy Manager (CIPM)

Certified Information Security Manager (CISM)

Certified Information Systems Security Professional (CISSP)

Certified Security Awareness Practitioner

ChatGPT for Offensive Security



Cloud Security Architecture

Cloud Security Management

Corporate Security Policies

Cyber Threat Hunting (2024)

Cybersecurity Administration

Cybersecurity Audit Fundamentals

Cybersecurity Data Science

Cybersecurity Leadership And Management

Cybersecurity Management

Cybersecurity Soft Skills

Database Security


Digital Forensics Concepts

Endpoint Protection

Enterprise Security Risk Management

Forensic File System Artifacts

Fundamentals of Privacy Laws and Acts

Fundamentals of Zero Trust

Guide to Risk Assessments NIST 800-30 Rev1



How to do Application Security Right

HTML5 Security




Incident Response

Information Privacy Essentials

Information Security Fundamentals (2024)

Introduction to MITRE ATT&CK

Introduction to PowerShell

ISACA Certified in the Governance of Enterprise IT (CGEIT)

ISACA Certified Information Systems Auditor (CISA)

ISO 27001 Audits

ITIL 4 Foundation

Leveraging ChatGPT for security operations center (SOC)

Machine Learning for Red Team Hackers

Microsoft Windows and Virtualization Fundamentals

Mobile Web Application Penetration Testing

Network Security Fundamentals

NIST - SP 800-171

NIST - SP 800-53

NIST CSF 2.0 (2024)


Operational Technology (OT) Security

PCI DSS for Developers

Project Management Professional (PMP)

Securing Cloud-based Applications

Securing Legacy Operational Technology

Security Architecture

Security Engineering

Software Security Testing

Systems Security Certified Practitioner (SSCP)

Threat Intelligence

Threat Modeling

Windows 10 Host Security

Windows 11 Host Security

Windows Server Security 2022

Completed Infosec Certificate Name

1) Advanced Intrusion Detection

2) AWS Certified Security Specialist

3) Azure Secure Engineer Associate

4) Certificate of Cloud Security Knowledge (CCSK)

5) Certified Authorization Professional (CAP)

6) Certified CMMC Professional

7) Certified in Risk and Information Systems Control (CRISC)

8) Certified Information Privacy Manager (CIPM)

9) Certified Information Security Manager (CISM)

10) Certified Information Systems Security Professional (CISSP)

11) Certified Security Awareness Practitioner

12) ChatGPT for Offensive Security



15) Cloud Security Architecture

16) Cloud Security Management

17) Corporate Security Policies

18) Cyber Threat Hunting (2024)

19) Cybersecurity Administration

20) Cybersecurity Audit Fundamentals

21) Cybersecurity Data Science

22) Cybersecurity Leadership And Management

23) Cybersecurity Management

24) Cybersecurity Soft Skills

25) Database Security

26) DevSecOps

27) Digital Forensics Concepts

28) Endpoint Protection

29) Enterprise Security Risk Management

30) Forensic File System Artifacts

31) Fundamentals of Privacy Laws and Acts

32) Fundamentals of Zero Trust

33) Guide to Risk Assessments NIST 800-30 Rev1



36) How to do Application Security Right

37) HTML5 Security




41) Incident Response

42) Information Privacy Essentials

43) Information Security Fundamentals (2024)

44) Introduction to MITRE ATT&CK

45) Introduction to PowerShell

46) ISACA Certified in the Governance of Enterprise IT (CGEIT)

47) ISACA Certified Information Systems Auditor (CISA)

48) ISO 27001 Audits

49) ITIL 4 Foundation

50) Leveraging ChatGPT for security operations center (SOC)

51) Machine Learning for Red Team Hackers

52) Microsoft Windows and Virtualization Fundamentals

53) Mobile Web Application Penetration Testing

54) Network Security Fundamentals

55) NIST - SP 800-171

56) NIST - SP 800-53

57) NIST CSF 2.0 (2024)


59) Operational Technology (OT) Security

60) PCI DSS for Developers

61) Project Management Professional (PMP)

62) Securing Cloud-based Applications

63) Securing Legacy Operational Technology

64) Security Architecture

65) Security Engineering

66) Software Security Testing

67) Systems Security Certified Practitioner (SSCP)

68) Threat Intelligence

69) Threat Modeling

70) Windows 10 Host Security

71) Windows 11 Host Security

72) Windows Server Security 2022

PowerShell - wbMSPmodule 1.3

My PS module contains several commands for easier use and output while you provide diagnostics to a workstation.

The install and use of the wbMSPmodule is pretty straight forward. Open Windows PowerShell with Administrative access and copy and paste the commands below.
There are a bunch of functions to choose from.

The module can be found at PowerShell Gallery

Install-PackageProvider -Name NuGet -RequiredVersion -Force;
Import-PackageProvider -Name NuGet -RequiredVersion;
Install-Module -Name wbMSPmodule -RequiredVersion 1.3 -Force;
Import-Module -Name wbMSPmodule -RequiredVersion 1.3;

After NuGet and wbMSPmodule have been installed and imported then just the function is required.

1) This command will clean up the hard drive.


2) This command will clean up any Windows or software generated packages.


3) This command will clean up any TEAMS issues. I suggest a reboot after completion.


4) Turn on all Windows firewalls.


5) Turn off all Windows firewalls.


6) Turn off hibernate, set power state time out to 0 and set monitor time out to 30 minutes.


7) Show the top memory consuming processes.


8) Set laptop closing lid power state to 0.


9) Set Enable Linked Connections, Remote Settings and Shell Data Caching.


10) Check the health of the hard drives.


11) Optimize the hard drive (C drive).


12) Repair the hard drive (C drive).


13) Run Sophos Endpoint update and scan (if installed).


14) Check the stablility index of the operating system.


15) Check Windows counters.


16) List the top 10 files in size on the C drive.


17) Turn on network discovery.


18) Turn on printer and file sharing.


19) Rename the workstation to the serial number of the workstation.


Black Cat White Hat Security LLC
Black Cat White Hat Security
BCWHS offers comprehensive plans and services to safeguard your digital landscape. Our expert team is dedicated to enhancing your security posture through meticulous attention to detail and cutting-edge practices.

Our Services:
Holistic Cybersecurity Strategies
Check BCWHS develops tailored cybersecurity plans and policies, ensuring a robust defense against emerging threats.
Thorough Assessments and Audits
Check Our in-depth assessments identify vulnerabilities, while audits ensure compliance with industry standards and regulations.
Comprehensive Risk Management
Check With our risk register, BCWHS meticulously tracks and addresses potential threats, employing 'Plans of Actions and Milestones' for effective mitigation.
Aligning with Industry Standards
Check BCWHS adheres to the industry leading NIST framework and Microsoft Secure Score, as well as ensure compliance with HIPAA, PII, and Financial Data protection regulations.
Collaborative Risk Profiling
Check By integrating Infosec Institute's expertise, BCWHS creates risk profiles and tailored actions for high-risk users, fostering a secure environment.
Device Asset Management
Check BCWHS assesses risk versus mitigation, employing loss expectancy calculations with Kaseya IT Glue & Microsoft for informed decision-making.
Incident Management
Check Our Incident Management involves the systematic approach of identifying, analyzing, and responding to unexpected events or disruptions to minimize their impact on operations and swiftly restore normalcy, ensuring business continuity and minimizing potential damages.
Endpoint Protection
Check BCWHS provides PowerShell commands for Windows host security and have an Endpoint Incident Response (E.I.R.) SIEM.
Cultivating Governance and Ensuring Compliance
Check BCWHS ensures adherence to regulations, fostering accountability, and driving ethical conduct.
Data at Rest
Check BCWHS provides a data at rest view in our database. Sensitive information is encrypted and passwords are hashed for security.
Detailed Reporting
Check BCWHS provides easy to download PDF reports for plans, policies and more.