Contact Wade Bachelder
CONTACT
Black Cat White Hat Security
B.C.W.H.S.
LinkedIn Profile
LINKEDIN
Wade Bachelder PowerShell
PS
Wade Bachelder Resume
RESUME
Meta Scan
SCAN
Site Title
Systems Security Engineer B.C.W.H.S. Consultation

Wade Bachelder Profile Photo ColdFusion Application Developer, Systems Security Engineer, and Consultant with a proven track record in managing the full lifecycle of complex Windows systems, databases, and applications. I leverage my technical programming expertise in Adobe ColdFusion and PowerShell to deliver robust, secure solutions. My key strengths lie in security and data privacy compliance, where I am recognized for developing and implementing strategies that enhance system performance, security, and regulatory adherence.

I have diligently pursued my cybersecurity education, earning a remarkable collection of continued education certificates issued by Infosec. My journey has led me through 83 learning paths (72 Displayed), where I have engaged with over 600 hours of videos, assessments, and exams. These learning experiences have not only deepened my understanding but have also honed my practical abilities, enabling me to excel in the ever-evolving landscape of cybersecurity.

Advanced Intrusion Detection

AWS Certified Security Specialist

Azure Secure Engineer Associate

Certificate of Cloud Security Knowledge (CCSK)

Certified Authorization Professional (CAP)

Certified CMMC Professional

Certified in Risk and Information Systems Control (CRISC)

Certified Information Privacy Manager (CIPM)

Certified Information Security Manager (CISM)

Certified Information Systems Security Professional (CISSP)

Certified Security Awareness Practitioner

ChatGPT for Offensive Security

CISSP ISSEP

CISSP ISSMP

Cloud Security Architecture

Cloud Security Management

Corporate Security Policies

Cyber Threat Hunting (2024)

Cybersecurity Administration

Cybersecurity Audit Fundamentals

Cybersecurity Data Science

Cybersecurity Leadership And Management

Cybersecurity Management

Cybersecurity Soft Skills

Database Security

DevSecOps

Digital Forensics Concepts

Endpoint Protection

Enterprise Security Risk Management

Forensic File System Artifacts

Fundamentals of Privacy Laws and Acts

Fundamentals of Zero Trust

Guide to Risk Assessments NIST 800-30 Rev1

HIPAA

HIPAA/HITECH

How to do Application Security Right

HTML5 Security

IAPP CIPP/E

IAPP CIPP/US

IAPP CIPT

Incident Response

Information Privacy Essentials

Information Security Fundamentals (2024)

Introduction to MITRE ATT&CK

Introduction to PowerShell

ISACA Certified in the Governance of Enterprise IT (CGEIT)

ISACA Certified Information Systems Auditor (CISA)

ISO 27001 Audits

ITIL 4 Foundation

Leveraging ChatGPT for security operations center (SOC)

Machine Learning for Red Team Hackers

Microsoft Windows and Virtualization Fundamentals

Mobile Web Application Penetration Testing

Network Security Fundamentals

NIST - SP 800-171

NIST - SP 800-53

NIST CSF 2.0 (2024)

NIST DoD RMF

Operational Technology (OT) Security

PCI DSS for Developers

Project Management Professional (PMP)

Securing Cloud-based Applications

Securing Legacy Operational Technology

Security Architecture

Security Engineering

Software Security Testing

Systems Security Certified Practitioner (SSCP)

Threat Intelligence

Threat Modeling

Windows 10 Host Security

Windows 11 Host Security

Windows Server Security 2022

1) Advanced Intrusion Detection

2) AWS Certified Security Specialist

3) Azure Secure Engineer Associate

4) Certificate of Cloud Security Knowledge (CCSK)

5) Certified Authorization Professional (CAP)

6) Certified CMMC Professional

7) Certified in Risk and Information Systems Control (CRISC)

8) Certified Information Privacy Manager (CIPM)

9) Certified Information Security Manager (CISM)

10) Certified Information Systems Security Professional (CISSP)

11) Certified Security Awareness Practitioner

12) ChatGPT for Offensive Security

13) CISSP ISSEP

14) CISSP ISSMP

15) Cloud Security Architecture

16) Cloud Security Management

17) Corporate Security Policies

18) Cyber Threat Hunting (2024)

19) Cybersecurity Administration

20) Cybersecurity Audit Fundamentals

21) Cybersecurity Data Science

22) Cybersecurity Leadership And Management

23) Cybersecurity Management

24) Cybersecurity Soft Skills

25) Database Security

26) DevSecOps

27) Digital Forensics Concepts

28) Endpoint Protection

29) Enterprise Security Risk Management

30) Forensic File System Artifacts

31) Fundamentals of Privacy Laws and Acts

32) Fundamentals of Zero Trust

33) Guide to Risk Assessments NIST 800-30 Rev1

34) HIPAA

35) HIPAA/HITECH

36) How to do Application Security Right

37) HTML5 Security

38) IAPP CIPP/E

39) IAPP CIPP/US

40) IAPP CIPT

41) Incident Response

42) Information Privacy Essentials

43) Information Security Fundamentals (2024)

44) Introduction to MITRE ATT&CK

45) Introduction to PowerShell

46) ISACA Certified in the Governance of Enterprise IT (CGEIT)

47) ISACA Certified Information Systems Auditor (CISA)

48) ISO 27001 Audits

49) ITIL 4 Foundation

50) Leveraging ChatGPT for security operations center (SOC)

51) Machine Learning for Red Team Hackers

52) Microsoft Windows and Virtualization Fundamentals

53) Mobile Web Application Penetration Testing

54) Network Security Fundamentals

55) NIST - SP 800-171

56) NIST - SP 800-53

57) NIST CSF 2.0 (2024)

58) NIST DoD RMF

59) Operational Technology (OT) Security

60) PCI DSS for Developers

61) Project Management Professional (PMP)

62) Securing Cloud-based Applications

63) Securing Legacy Operational Technology

64) Security Architecture

65) Security Engineering

66) Software Security Testing

67) Systems Security Certified Practitioner (SSCP)

68) Threat Intelligence

69) Threat Modeling

70) Windows 10 Host Security

71) Windows 11 Host Security

72) Windows Server Security 2022

PowerShell - wbMSPmodule 1.4


My PS module contains several commands for easier use and output while you provide diagnostics to a workstation.

The install and use of the wbMSPmodule is pretty straight forward. Open Windows PowerShell with Administrative access and copy and paste the commands below.

There are a bunch of functions to choose from.

The module can be found at PowerShell Gallery
 

wbMSPmodule 1.4 Installation

Install-PackageProvider -Name NuGet -RequiredVersion 2.8.5.201 -Force;
Import-PackageProvider -Name NuGet -RequiredVersion 2.8.5.201;
 
Install-Module -Name wbMSPmodule -RequiredVersion 1.4 -Force;
Import-Module -Name wbMSPmodule -RequiredVersion 1.4;

After NuGet and wbMSPmodule have been installed and imported then just the function is required.

1) This command will clean up the hard drive.

wbMSPgeneralDiskCleanUp

2) This command will clean up any Windows or software generated packages.

wbMSPpackageCleanUp

3) This command will clean up any TEAMS issues. I suggest a reboot after completion.

wbMSPTEAMSCleanUp

4) Turn on all Windows firewalls.

wbMSPfireWallOn

5) Turn off all Windows firewalls.

wbMSPfireWallOff

6) Turn off hibernate, set power state time out to 0 and set monitor time out to 30 minutes.

wbMSPsetPowerState

7) Show the top memory consuming processes.

wbMSPshowMemoryProcesses

8) Set laptop closing lid power state to 0.

wbMSPsetLaptopPower

9) Set Enable Linked Connections, Remote Settings and Shell Data Caching.

wbMSPsetRegistry

10) Check the health of the hard drives.

wbMSPcheckHDHealth

11) Optimize the hard drive (C drive).

wbMSPoptimizeHD

12) Repair the hard drive (C drive).

wbMSPrepairHD

13) Run Sophos Endpoint update and scan (if installed).

wbMSPsophosUpdateScan

14) Check the stablility index of the operating system.

wbMSPwindowsStabilityIndex

15) Check Windows counters.

wbMSPwindowsCounters

16) List the top 10 files in size on the C drive.

wbMSPlistTop10Files

17) Turn on network discovery.

wbMSPnetworkDiscoveryOn

18) Turn on printer and file sharing.

wbMSPfileDiscoveryOn

19) Rename the workstation to the serial number of the workstation.

wbMSPrenameWorkstation

20) Update Windows Defender.

wbMSPMPUpdate

21) Windows Defender Quickscan.

wbMSPQuickScan

22) View Application Logs.

wbMSPAppLogs

23) View Security Logs.

wbMSPSecurityLogs

24) View System Logs.

wbMSPSystemLogs

25) View BitLocker Volume.

wbMSPcheckBLVolume

26) View BitLocker Status.

wbMSPcheckBLStatus

How-To Videos and PowerShell

LinkedIn Profiles & Articles

Profiles

My LinkedIn Profile

B.C.W.H.S. L.L.C.

PowerShell Articles

PS: Disable Autoplay

PS: Autorun Default

PS: Autoplay Non-volume

PS: Disable Shares

PS: Drive Scan

PS: Enumerate

PS: Google Chrome

PS: Domain DNS

PS: Digitial Sign

PS: UAC

PS: Invalid Signature

PS: Microsoft Defender

PS: Adobe Reader

PS: Third Party

PS: System Clean Up

PS: Copy Profile

PS: Email

ColdFusion Articles

CF: OpenAI

CF: Microsoft Graph

CF: Infosec IQ

CF: Infosec Skills

CF: GoDaddy

CF: Kaseya ITGlue

CF: Kaseya BMS

CF: Bitdefender

CF: Uptime Robot

CF: Error Handling

Misc Articles

30K Club

Bluetooth Enabled?

DALL-E-3

Anger: Part 2

Anger: Part 1

Excel to Rest!

Black Cat White Hat Security LLC - Full Site
Black Cat White Hat Security
B.C.W.H.S. L.L.C. offers comprehensive plans and services to safeguard your digital landscape. Our expert team is dedicated to enhancing your security posture through meticulous attention to detail and cutting-edge practices.


Black Cat White Hat Security LLC - Microsoft ® Tenant Lite
Black Cat White Hat Security
M365 Monitoring and Incidents. Perform hassle-free Microsoft ® 365 monitoring with audit logs, devices, risk events, security alerts and incidents, and more with Graph API.

Site Title
Experience the fusion of imagination and intelligence - where art meets AI to create masterpieces beyond human limits.

My Cybersecurity Awareness Infographics

   
   
   
   

Website Meta Data Reader

The easiest way to preview meta information on your website. Headers, Meta Tags, Open Graph, Cards and more.