1-Day Workshop · 31 Aug 2026 · Amara Singapore

Digital Evidence

Everyone Has A Digital Trail

Digital devices have become an inescapable part of modern life — and so has the evidence they leave behind. This intensive one-day workshop equips investigators and compliance professionals with the practical skills to collect, preserve, and present digital evidence that holds up in court.

Hands-on · Practice-based Windows laptop required No prior experience needed Govt billing via Vendors@Gov
1Full Day
8Programme Topics
INTERPOLTrainer's Network
★★★★★Past Participants
Upcoming run
31 Aug 2026
9 am – 5 pm · Amara Singapore
Following run 26 Feb 2027
Fees (SGD, nett, per person)
Normal rate (from 11 Aug)$ 897.90
Early bird (by 10 Aug)$ 816.50
Group of 3+ (by 10 Aug)$ 748.25
GST not applicable · Govt billing via Vendors@Gov / InvoiceNow
Past participants from
CPIB SCDF JTC Corporation Singapore Police Force Singapore Government Agencies

What Past Participants Say

Hear from Professionals Who Have Attended

★★★★★

"Thank you for conducting the course! I learned new knowledge and am feeling more confident when dealing with digital forensic materials. I'm excited to adopt more best practices and tools."

Investigation Officer

CPIB

★★★★★

"Learned new things about digital evidence gathering — especially about the custody of evidence and processes."

Senior Manager

JTC Corporation

★★★★★

"Yes! Appreciate the lesson. We would definitely explore other courses with regards to digital forensics if available."

Fire Investigator

SCDF

★★★★★

"The trainer was very patient in guiding all of us, answering our questions and even questions that were out of the syllabus."

Participant

Singapore Government Agency

★★★★★

"It provides a good overview on the gathering of digital evidence and tools used for analysis of it."

Participant

Singapore Government Agency

★★★★★

"Thank you! Parameters of extraction and use of digital data made clearer with this course."

Participant

Singapore Government Agency

Why This Matters

Digital Evidence Is Everywhere.
Mishandling It Can Destroy a Case.

Digital devices have become ubiquitous in everyday life — and in every investigation. But digital evidence that is improperly collected, handled, or documented can be challenged, excluded, or rendered worthless before it ever reaches court.

Evidence Lost to Poor Collection

Digital evidence can be overwritten, corrupted, or destroyed in seconds if not handled correctly. Without the right techniques for identifying, isolating, and acquiring data from mobile devices and computers, critical evidence may be gone before an investigation properly begins.

Inadmissible Evidence in Proceedings

Even evidence that exists can fail in court. Without a properly documented chain of custody, forensically sound acquisition methods, and preservation protocols that meet legal standards, digital evidence is vulnerable to challenge — and investigators are exposed to scrutiny.

Unable to Analyse or Present Findings

Collecting data is only the first step. Without skills in keyword search, data filtering, metadata analysis, and structured evidence reporting, investigators are unable to extract meaningful intelligence or present their findings in a clear and convincing manner to decision-makers or courts.

About This Workshop

Collect it properly.
Preserve it completely.
Present it convincingly.

Digital Evidence is a one-day intensive workshop designed to equip investigators, audit officers, compliance professionals, and law enforcement personnel with the practical skills to handle digital evidence across its full lifecycle — from identification and seizure through analysis and court-ready presentation.

Led by a seasoned digital forensics expert with INTERPOL and EUROPOL network credentials and active experience in large-scale cybersecurity incident response, the programme covers all major evidence types across mobile devices, computers, social media, and smart devices.

  • 01Hands-on throughout — every module is practice-based using real devices and forensic tools on your Windows laptop.
  • 02No prior digital forensics experience required — the course is built for investigators and compliance professionals, not technical specialists.
  • 03Evidence-legal alignment — chain of custody, admissibility standards, and court presentation are built into every module, not treated as an afterthought.
  • 04Taught by a practitioner with multi-jurisdictional DFIR experience, multiple industry certifications, and presentations at Black Hat Asia and AUSCERT.

Who Should Attend

Officers involved in investigation, audit, compliance, fraud, or enforcement — at any level

This course is designed for professionals whose work may involve digital evidence — whether as first responders to an incident, investigation officers building a case, or compliance staff conducting reviews. No prior technical background is required.

Participants must bring a Windows laptop that can connect to the internet. Mac laptops and tablets are not suitable for this course.

Investigation Officers Audit Officers Compliance Professionals Scam & Fraud Prevention Risk Assessment Security Screening Loss Prevention Law Enforcement Probation Officers Regulatory Officers

Key Take-aways

Four Capabilities You Leave With

Each take-away is a practised skill — not a concept to remember, but an ability you can apply to a real investigation the moment you return to your desk.

Collect Digital Evidence Correctly

A structured approach to identifying and acquiring digital evidence from mobile devices, computers, social media, and smart devices — using the right techniques and tools to ensure nothing is destroyed, overwritten, or compromised during collection.

Preserve Evidence to Legal Standards

The protocols for maintaining chain of custody, preventing data destruction, and storing digital evidence in a manner that satisfies admissibility requirements — so what you collect can be used, not just referenced.

Analyse Evidence Effectively

Practical techniques for extracting intelligence from digital evidence — keyword search, data filtering, metadata analysis, and device-specific acquisition — enabling investigators to surface what matters quickly and accurately.

Present Findings Clearly and Convincingly

The structure and standards for preparing and presenting digital evidence as a formal report — covering how to communicate technical findings to non-technical decision-makers, disciplinary panels, or courts in a clear, concise, and credible manner.

Programme Outline

Eight Topics, One Full Day

The programme moves from evidence fundamentals and legal frameworks through hands-on device acquisition and analysis, culminating in chain of custody design and court-ready evidence presentation.

Topic 1 Main Types of Digital Evidence & Traces
  • Overview of digital evidence categories: emails, chat messages, social media, photos, videos, computer files
  • How digital traces are created, stored, and recovered
  • Understanding metadata and file system artefacts
  • Evidence triage: identifying what is relevant and where to look first
Topic 2 Guidelines of Search & Seizure
  • Legal framework for digital search and seizure in Singapore
  • Authority and scope: what you can and cannot seize
  • On-scene decision-making: live vs. powered-off devices
  • Documenting the scene before any device is touched
Topic 3 Mobile Devices: Identification, Isolation, Acquisition
  • Identifying device types and operating systems
  • Isolation techniques: preventing remote wipe, data sync, and remote access
  • Acquisition methods: logical, file system, and physical extraction
  • Hands-on practice: acquiring data from a mobile device
Topic 4 Computer: Identification, Isolation, Acquisition
  • Live vs. dead box acquisition: when to pull the plug and when not to
  • Volatile data collection: RAM, running processes, network connections
  • Disk imaging: creating forensically sound bit-for-bit copies
  • Hash verification: proving evidence integrity from acquisition to court
Topic 5 Encryption & Backup of Modern Devices
  • Understanding device encryption and its impact on acquisition
  • Cloud backup sources: what data is stored and how to access it lawfully
  • Bypassing screen locks: legal approaches and tool-assisted methods
  • Working with encrypted devices: documentation and escalation protocols
Topic 6 Collection of Evidence: Smart Devices, Mail, Social Media
  • Smart device evidence: wearables, IoT devices, vehicle data
  • Email evidence: headers, metadata, server logs, and preservation
  • Social media evidence: platform policies, public vs. private data, screenshot standards
  • Digital evidence analysis: keyword search, data filtering, metadata review
Topic 7 Preserving Digital Evidence for Court
  • Admissibility requirements: what courts expect of digital evidence
  • Preventing data destruction, loss, and tampering post-acquisition
  • Storage standards: media, labelling, access controls, and retention periods
  • Presenting digital evidence as a formal report: structure, language, and standards
Topic 8 Step-by-Step Chain of Custody Design
  • What chain of custody means and why it can make or break a case
  • Documenting every point of contact: who, what, when, where
  • Designing a chain of custody form tailored to your organisation
  • Hands-on exercise: complete a full chain of custody for a sample case

Pre-Requisites & Equipment

  • ·No prior digital forensics experience required
  • ·Internet-enabled Windows laptop — Mac and tablets are not suitable
  • ·Free hotel WiFi provided (password access on the day)

Included in This Course

  • ·Soft copy course materials and tool reference guides
  • ·Refreshments and lunch
  • ·Certificate of participation

Good to Know

How this programme differs from
SkillsFuture-funded courses

Our programme is not SkillsFuture-funded. Here is why that works in your favour.

Typical SkillsFuture-Funded Courses
Digital Evidence
Digital forensics content is often outdated by the time a course reaches accreditation — tools, devices, and legal standards evolve faster than approval cycles.
Content reviewed and updated before every run to reflect current devices, forensic tools, platform policies, and court admissibility standards.
Curricula typically focus on awareness and general concepts — rarely covering hands-on acquisition, chain of custody design, or platform-specific evidence collection.
Built around operational output — hands-on device acquisition, evidence analysis, chain of custody design, and court-ready report preparation.
Generic exercises not tailored to the investigation and compliance roles found in Singapore government agencies and statutory boards.
All exercises use realistic investigation scenarios drawn from audit, compliance, fraud prevention, and law enforcement contexts.
Large cohort sizes limit individual hands-on practice time and reduce access to expert guidance during exercises.
Small cohort. Direct, personalised guidance from a practitioner with active DFIR experience across Asia Pacific and Europe throughout the day.

What You'll Gain

Leave with Skills You Use
the Very Next Day

After one day, you will have practised every skill — not just observed it demonstrated. Each learning outcome maps directly to investigative capability you can apply immediately.

01

Identify the Right Digital Evidence

Recognise the full range of digital evidence types — devices, files, metadata, email, social media, and smart devices — and determine which sources are most relevant to a given investigation.

02

Apply Search & Seizure Correctly

Execute the legal and procedural requirements for digital search and seizure in Singapore — from on-scene decision-making through device isolation — without inadvertently compromising the evidence.

03

Acquire Evidence from Devices

Use appropriate acquisition methods for mobile devices and computers — including forensically sound imaging, hash verification, and encrypted device protocols — to capture data in a legally defensible form.

04

Analyse Digital Evidence Effectively

Extract actionable intelligence from acquired evidence using keyword search, data filtering, and metadata analysis — and understand what each technique reveals and its limitations.

05

Maintain a Proper Chain of Custody

Design and implement a step-by-step chain of custody process — documenting every point of contact from seizure to court — so evidence integrity can be demonstrated and challenged with confidence.

06

Present Evidence That Holds Up

Prepare a clear, concise, and convincing digital evidence report — structured to meet the standards expected by disciplinary panels, legal counsel, and courts — communicating technical findings to non-technical audiences.

Your Facilitator

A DFIR Practitioner with Active Experience
Across Asia Pacific and Europe

Kevin Tan
Senior Incident Response & Digital Forensic Analyst · Group-IB
GIAC Cloud Forensics Responder (GCFR) GIAC Certified Incident Handler (GCIH) Certified Digital Forensics Professional (eCDFP) Blue Team Level 1 (BTL1) Black Hat Asia — Arsenal Presenter, 2021 AUSCERT Presenter, 2021 Belkasoft CTF 2022 — 1st Place FOR608 Challenge Coin

Kevin Tan leads digital forensics and incident response (DFIR) investigations into large-scale cybersecurity incidents across Asia Pacific and Europe at Group-IB — one of the world's leading threat intelligence and cybersecurity companies, recognised by INTERPOL, EUROPOL, and top industry analysts including Gartner, Forrester, and IDC.

Kevin has trained law enforcement agencies and government bodies in Singapore, Hong Kong, and Malaysia, and has guest lectured at universities. His professional excellence has been recognised through the FOR608 Challenge Coin, Hacksmith v4.0 Hackathon Winner, and 1st Place at the Belkasoft CTF 2022.

He has presented at prominent international conferences including Black Hat Asia (Arsenal Presenter, 2021) and AUSCERT (Presenter, 2021). His training approach is grounded in live operational experience — every technique, tool, and protocol he teaches is drawn from active DFIR investigations, not classroom theory.

Trainer's Professional Network & Recognition
INTERPOL EUROPOL Group-IB Black Hat Asia AUSCERT Belkasoft

Frequently Asked Questions

Common Questions

No prior experience is required. This course is designed for investigators, audit officers, compliance professionals, and law enforcement personnel who need practical digital evidence skills — not for IT or cybersecurity specialists. It starts from foundational concepts and builds to hands-on acquisition and analysis by the end of the day.
The forensic tools used in this course run on Windows only. Mac laptops and tablets are not suitable and cannot be used as a substitute. Please bring an internet-enabled Windows laptop. Hotel WiFi is provided with password access on the day. If you have concerns about using a work device, please contact us in advance.
The course covers all major categories of digital evidence encountered in investigations: mobile devices (phones and tablets), computers (Windows), emails, social media posts and account data, photos and videos, computer files, and smart devices. Encryption, cloud backups, and metadata are also covered, along with analysis techniques including keyword search, data filtering, and metadata review.
Yes. The course is built around Singapore's legal and procedural framework for digital evidence. This includes the search and seizure guidelines, admissibility standards, and chain of custody requirements that apply in Singapore courts and disciplinary proceedings. The trainer has direct experience working with Singapore law enforcement and government agencies.
A pre-filled justification letter is available. Click the button to download.
Government agencies and statutory boards are invoiced through Vendors@Gov or InvoiceNow on 30-day payment terms. Include your BU code in the registration form and we will handle the rest. No upfront payment is required for government entities.
Substitution is allowed at any time at no charge. Postponement is allowed free of charge before the course is confirmed to run, but is subject to approval after confirmation. Cancellation is free before the course is confirmed to run. After confirmation, a withdrawal fee applies based on notice period: 21+ days (15%), 20–14 days (25%), 13–7 days (50%), 6 days or fewer (100%). Absentee, no-show, or medical leave — the full fee is due.
Yes. In-house runs are available and can be customised to your agency's investigation types, device environment, and specific compliance requirements. This is particularly effective for investigation units or audit teams who want a shared operating standard for digital evidence handling. Email info@maitreallianz.com or call +65 6100 0621 to discuss.

Secure Your Place

Register for Digital Evidence

31 Aug 2026 · Amara Singapore · 9:00 am – 5:00 pm

Booking Person

Invoice Attention To (leave blank if same as booking person)
Government agencies only

Participant(s) Attending