Our Live sessions are offered on Demand and are about 30 mins in length. More details about the session are below along with information on how to contact us to request a session.
This session walks through how to effectively scan applications using Black Duck, helping teams understand what’s being scanned, how it’s being scanned, and what risks they’re managing.
Key Takeaways
- Start with Dependencies: Use package manager data to identify declared components.
- Go Deeper with Signatures: Scan file and directory fingerprints to uncover undeclared or modified code.
- Understand Your Codebase: Know what’s included in the scan and validate matches for accuracy.
- Snippets & Binaries: Detect embedded OSS code and scan compiled binaries when source isn’t available.
- Container Scanning: Analyze Docker images layer-by-layer for full visibility.
To sign up for this session please email best-practices@blackduck.com with a subject of Best Practice Session and reference this course Deep Dive into Black Duck Scanning and we will contact you to schedule a session.