Site Title
LinkedIn Profile
Wade Bachelder Resume
Wade Bachelder PowerShell
Contact Wade Bachelder

I am a dedicated and accomplished application developer and multi-hat information Security Systems Engineer with a track record of successfully managing the full lifecycle of diverse systems, networks, and databases. Proficient in programming languages such as ColdFusion and PowerShell, with expertise in cybersecurity and HIPAA compliance. Known for implementing robust solutions that enhance system performance and security.

I am advancing my expertise in cybersecurity through a comprehensive education, and as part of this commitment, I have leveraged the resources offered by Infosec Institute. By enrolling in classes from industry-leading organizations like Infosec, NIST, ISACA, and (ISC)2, I am continuously enhancing my knowledge and skills in the field of cybersecurity and privacy.
Since November 2022, I have diligently pursued my cybersecurity education, earning a remarkable collection of continued education certificates issued by Infosec. My journey has led me through 82 learning paths (70 Displayed), where I have engaged with over 585 hours of videos, assessments, and exams. These learning experiences have not only deepened my understanding but have also honed my practical abilities, enabling me to excel in the ever-evolving landscape of cybersecurity.
With each milestone achieved, I have embraced the challenges with enthusiasm and a determination to stay ahead in the field. My unwavering commitment to continuous learning demonstrates my passion for cybersecurity and my dedication to being at the forefront of the industry's best practices.

Advanced Intrusion Detection

AWS Certified Security Specialist

Azure Secure Engineer Associate

Certificate of Cloud Security Knowledge (CCSK)

Certified Authorization Professional (CAP)

Certified CMMC Professional

Certified in Risk and Information Systems Control (CRISC)

Certified Information Privacy Manager (CIPM)

Certified Information Security Manager (CISM)

Certified Information Systems Security Professional (CISSP)

Certified Security Awareness Practitioner



Cloud Security Architecture

Cloud Security Management

Corporate Security Policies

Cyber Threat Hunting (2024)

Cybersecurity Administration

Cybersecurity Audit Fundamentals

Cybersecurity Data Science

Cybersecurity Leadership And Management

Cybersecurity Management

Cybersecurity Soft Skills

Database Security


Digital Forensics Concepts

Endpoint Protection

Enterprise Security Risk Management

Forensic File System Artifacts

Fundamentals of Privacy Laws and Acts

Fundamentals of Zero Trust

Guide to Risk Assessments NIST 800-30 Rev1



How to do Application Security Right

HTML5 Security




Incident Response

Information Privacy Essentials

Introduction to MITRE ATT&CK

Introduction to PowerShell

ISACA Certified in the Governance of Enterprise IT (CGEIT)

ISACA Certified Information Systems Auditor (CISA)

ISO 27001 Audits

ITIL 4 Foundation

Leveraging ChatGPT for security operations center (SOC)

Machine Learning for Red Team Hackers

Microsoft Windows and Virtualization Fundamentals

Mobile Web Application Penetration Testing

Network Security Fundamentals

NIST - SP 800-171

NIST - SP 800-53

NIST CSF 2.0 (2024)


Operational Technology (OT) Security

PCI DSS for Developers

Project Management Professional (PMP)

Securing Cloud-based Applications

Securing Legacy Operational Technology

Security Architecture

Security Engineering

Software Security Testing

Systems Security Certified Practitioner (SSCP)

Threat Intelligence

Threat Modeling

Windows 10 Host Security

Windows 11 Host Security

Windows Server Security 2022

Completed Infosec Certificate Name

1) Advanced Intrusion Detection

2) AWS Certified Security Specialist

3) Azure Secure Engineer Associate

4) Certificate of Cloud Security Knowledge (CCSK)

5) Certified Authorization Professional (CAP)

6) Certified CMMC Professional

7) Certified in Risk and Information Systems Control (CRISC)

8) Certified Information Privacy Manager (CIPM)

9) Certified Information Security Manager (CISM)

10) Certified Information Systems Security Professional (CISSP)

11) Certified Security Awareness Practitioner



14) Cloud Security Architecture

15) Cloud Security Management

16) Corporate Security Policies

17) Cyber Threat Hunting (2024)

18) Cybersecurity Administration

19) Cybersecurity Audit Fundamentals

20) Cybersecurity Data Science

21) Cybersecurity Leadership And Management

22) Cybersecurity Management

23) Cybersecurity Soft Skills

24) Database Security

25) DevSecOps

26) Digital Forensics Concepts

27) Endpoint Protection

28) Enterprise Security Risk Management

29) Forensic File System Artifacts

30) Fundamentals of Privacy Laws and Acts

31) Fundamentals of Zero Trust

32) Guide to Risk Assessments NIST 800-30 Rev1



35) How to do Application Security Right

36) HTML5 Security




40) Incident Response

41) Information Privacy Essentials

42) Introduction to MITRE ATT&CK

43) Introduction to PowerShell

44) ISACA Certified in the Governance of Enterprise IT (CGEIT)

45) ISACA Certified Information Systems Auditor (CISA)

46) ISO 27001 Audits

47) ITIL 4 Foundation

48) Leveraging ChatGPT for security operations center (SOC)

49) Machine Learning for Red Team Hackers

50) Microsoft Windows and Virtualization Fundamentals

51) Mobile Web Application Penetration Testing

52) Network Security Fundamentals

53) NIST - SP 800-171

54) NIST - SP 800-53

55) NIST CSF 2.0 (2024)


57) Operational Technology (OT) Security

58) PCI DSS for Developers

59) Project Management Professional (PMP)

60) Securing Cloud-based Applications

61) Securing Legacy Operational Technology

62) Security Architecture

63) Security Engineering

64) Software Security Testing

65) Systems Security Certified Practitioner (SSCP)

66) Threat Intelligence

67) Threat Modeling

68) Windows 10 Host Security

69) Windows 11 Host Security

70) Windows Server Security 2022

PowerShell - wbMSPmodule 1.3

The install and use of the wbMSPmodule is pretty straight forward. Open Windows PowerShell with Administrative access and copy and paste the commands below.
There are a bunch of functions to choose from.

The module can be found at PowerShell Gallery

Install-PackageProvider -Name NuGet -RequiredVersion -Force;
Import-PackageProvider -Name NuGet -RequiredVersion;
Install-Module -Name wbMSPmodule -RequiredVersion 1.3 -Force;
Import-Module -Name wbMSPmodule -RequiredVersion 1.3;

After NuGet and wbMSPmodule have been installed and imported then just the function is required.

1) This command will clean up the hard drive.


2) This command will clean up any Windows or software generated packages.


3) This command will clean up any TEAMS issues. I suggest a reboot after completion.


4) Turn on all Windows firewalls.


5) Turn off all Windows firewalls.


6) Turn off hibernate, set power state time out to 0 and set monitor time out to 30 minutes.


7) Show the top memory consuming processes.


8) Set laptop closing lid power state to 0.


9) Set Enable Linked Connections, Remote Settings and Shell Data Caching.


10) Check the health of the hard drives.


11) Optimize the hard drive (C drive).


12) Repair the hard drive (C drive).


13) Run Sophos Endpoint update and scan (if installed).


14) Check the stablility index of the operating system.


15) Check Windows counters.


16) List the top 10 files in size on the C drive.


17) Turn on network discovery.


18) Turn on printer and file sharing.


19) Rename the workstation to the serial number of the workstation.



Black Cat White Hat Security
Black Cat White Hat Security
Empowering Your Cyber Defense: Tailored Solutions from Black Cat White Hat Security.
At Black Cat White Hat Security, we take your cybersecurity seriously, offering comprehensive plans and services to safeguard your digital landscape. Our expert team is dedicated to enhancing your security posture through meticulous attention to detail and cutting-edge practices.

Our Services:
Holistic Cybersecurity Strategies: We develop tailored cybersecurity plans and policies, ensuring a robust defense against emerging threats.
Thorough Assessments and Audits: Our in-depth assessments identify vulnerabilities, while audits ensure compliance with industry standards and regulations.
Comprehensive Risk Management: With our risk register, we meticulously track and address potential threats, employing 'Plans of Actions and Milestones' for effective mitigation.
Aligning with Industry Standards: We adhere to the industry leading NIST framework and Microsoft Secure Score, as well as ensure compliance with HIPAA, PII, and Financial Data protection regulations.
Collaborative Risk Profiling: By integrating Infosec Institute's expertise, we create risk profiles and tailored actions for high-risk users, fostering a secure environment.
Device Asset Management: We assess risk versus mitigation, employing loss expectancy calculations with Kaseya IT Glue for informed decision-making.
Sign up for a free account!

Black Cat White Hat Security: API WhiskerHub
Black Cat White Hat Security Reporting
A self-contained application with its own dedicated registration and sign-in process, distinct from the main site. These reports are specifically designed to provide in-depth insights into API integrations. Enjoy the convenience of a separate and hassle-free access to API Reports, which are completely FREE of charge. Tailored to cater to the needs of small to mid-size M.S.P.'s utilizing these platforms, API Reports are the perfect solution to enhance your business operations.
Sign up for a free account!