Diploma in Digital Forensics (T55)

Diploma in Digital Forensics

2017 Planned Intake: 50 JAE 2017 Last Aggregate Score: 11 Course is applicable only for AY2017/2018 intake and earlier

The threat of digital crime is very, very real.

Identity theft, account hacking and digital espionage might sound like the stuff of movies, but they’re merely some examples of the types of digital crime the world now faces.

This new type of crime calls for a new type of crime fighting - digital forensics. If you have an analytical and inquisitive mind, join us to become a Computer Forensics Investigator.

Unravel the mystery behind a digital crime one byte at a time.

 The increasing complexity of cybercrimes coupled with the fast evolving digital landscape that we operate in today, presents a challenging and dynamic environment for the Police to operate in. It is thus reassuring that TP is developing a pool of skilled digital forensic professionals whom the Police can tap on in our fight against cybercrime.
—  Technology Crime Division
     Criminal Investigation Department
     Singapore Police Force
Unravel the mystery behind a digital crime


What you will learn

  • Secure Evidence

    Secure Evidence

    In Year 1, you will learn fundamental Computer Science subjects that help you understand the intricasies of cyber space and provide you the foundation you will need to become a skilled digital forensics investigator. You will learn the principles of securing evidence and managing a forensics investigation.
  • Conduct Investigations

    Conduct Investigations

    You will learn to secure digital evidence and use high tech tools for investigation and analysis of such evidence. You will also learn about the legal system and the behavior of criminal minds. You will work on many practical cases to hone your skills in the different aspects of digital forensics.
  • Analyse and Present Findings

    Analyse and Present Findings

    You will learn about the advanced areas of digital forensics and use sophisticated software in our Advanced Cyber Security Training Facility, set-up in collaboration with the Ministry of Home Affairs. This will help you to hone your skills of analysis and learn to present your findings. You will be attached to organisations like the Criminal Investigations Department (CID) in Singapore or similar facilities overseas to apply your skills.

Notable Features

  • The only digital forensics diploma course in Singapore that covers training in computer science, digital forensics techniques, psychology of criminal behaviors and criminal procedures.
  • Strong partnerships with industry including the Singapore Infocomm Technology Security Authority (SITSA) and Information System Audit & Control Association (ISACA).
  • Learn from highly qualified experts who can testify in court on forensics cases.
  • The only polytechnic to have a Centre for Digital Security & Investigations set up with SITSA under the Minister of Home Affairs.
  • Secure prestigious scholarships such as the IIS or ST Electronics (Info-Security) Scholarships.

Career Prospects

Embark on an exciting career as a crime scene investigator. You could work for law enforcement agencies, financial institutions, consulting firms and a range of other organisations in positions such as a digital forensics analyst, digital forensics investigator, IT security analyst, cyber security auditor and so on.

Further Education

You can undertake the Earn and Learn Programme and acquire a Specialist Diploma + Work Experience. Find out details here

For degree courses and advanced standing, please click this link to access diploma to degree courses for guidance.

Entry Requirements

Minimum Entry Requirements

English Language (EL1)* Grades 1-6
Mathematics (E or A) Grades 1-6
Any two other subjects, excluding CCA Grades 1-6

To be eligible for selection, applicants must also have sat for one of the following subjects: Additional Combined Science, Additional Science, Biology, Biotechnology, Chemistry, Combined Science, Computer Studies, Creative 3-D Animation, Design & Technology, Engineering Science, Food & Nutrition,Fundamentals of Electronics, General Science, Human & Social Biology, Integrated Science, Physics, Physical Science, Science (Chemistry, Biology), Science (Physics, Biology), Science (Physics, Chemistry), Science (Physics, Chemistry, Biology).

Note: Applicants with complete colour vision deficiency are not eligible to apply for this course.

See also the minimum entry requirements for:

Course Structure

TP Core Subjects

Subject code Subject LevelCredit Units

This subject introduces you to the principles of effective interpersonal communication. You will learn to consider the message, audience, purpose and strategy in all communicative acts. You will also learn the appropriate conventions to observe in social interaction and how to engage in and sustain conversations.


This subject aims to equip students with the knowledge and skills to obtain employment and to develop confidence in handling both interpersonal skills and business correspondence in the workplace. You will learn job hunt skills.  You will also discover ways to communicate effectively and tactfully in the workplace.  By using the concepts of message, audience, purpose and strategy, you will learn to show sensitivity to your audience.


This subject deals with the general principles of persuasion. You will be taught persuasive strategies to write a proposal and convince an audience about an idea, product or service. You will also be taught to consider the message, audience, purpose and strategy in written and oral presentations.


Students will learn to do research on job roles and companies, prepare cover letters and resumes and learn how to prepare and present themselves for interviews.


LEAP 1, 2 and 3 are three fundamental subjects that seek to cultivate in you, the attitude, skills and knowledge for the development of your leadership competencies. This character-based leadership programme enables you to develop your life-skills through establishing personal core values, which will become the foundation for your leadership credibility and influence.


LEAP 1, 2 and 3 are three fundamental subjects that seek to cultivate in you, the attitude, skills and knowledge for the development of your leadership competencies. This character-based leadership programme enables you to develop your life-skills through establishing personal core values, which will become the foundation for your leadership credibility and influence.


LEAP 1, 2 and 3 are three fundamental subjects that seek to cultivate in you, the attitude, skills and knowledge for the development of your leadership competencies. This character-based leadership programme enables you to develop your life-skills through establishing personal core values, which will become the foundation for your leadership credibility and influence.


This subject has a structured programme that will help to develop important workplace skills for application in a real work environment. The subject will cover a pre-internship training programme and a mentorship programme with the industry. The subject will also cover the roles and functions of an IT professional in an industry and ability to contribute effectively with a high level of professionalism in the workplace.


Diploma Subjects - Core Subjects

Subject code Subject LevelCredit Units

This subject covers the enterprise wired and wireless networking concepts. Basic theories of routing and switching, wireless architecture and their applications in an enterprise network environment will be discussed. You will learn the knowledge and skills to design, install and configure small to medium-sized wired and wireless networks.


This subject introduces students to the issues related to IT law and ethics. Topics covered include the computer misuse act, personal data privacy act and intellectual property rights.


This subject aims to provide the students with a foundational understanding of cyber security, common threats, and an appreciation of the controls that can be used to mitigate cyber-attacks. It introduces key elements of Information security based on confidentiality, integrity and availability and how they are applied in various security scenarios. Students  can proceed to develop deeper skills of implementing security controls within their respective domains. The subject covers technical controls at basic levels with hands-on practicals to illustrate concepts. The subject also covers a broad range of concepts such as security policies, procedures, and processes to protect IT systems against cyber-attacks and information breaches.   


This subject introduces the fundamental concepts of relational database systems, the design methods specific to relational database, database manipulation using a database query language, and the techniques of implementing relational databases. It will also cover implementation of simple applications to access relational database.


This subject introduces the concept of Human-Centered Design, and its practice to create useful digital products and interfaces that offer an enriching user experience (UX). The topics covered include designing interfaces, need findings, sketching and prototyping for interactive experiences, and usability testing.


This subject covers the data analytics lifecycle, including gathering, cleaning, processing and visualising of data. Exploratory data analysis methods, descriptive and predictive analytics and the presentation of insights will also be covered.


This subject aims to equip students with the knowledge and skills to formulate, analyse and interpret data. Students will be able to apply statistical knowledge and methods of data analysis that are useful in business environments. Students will be taught to use a statistical software to analyse data. This subject covers descriptive statistics, probability theory, normal distribution, estimation, hypothesis testing, and linear regression.


This subject covers the theoretical and practical aspects of networking and its related technologies. Topics covered include network protocols and communications, Ethernet networks, TCP/IP networking model, IP addressing, virtual local area networks (VLANs), routing and switching concepts and static and dynamic routing.


This subject introduces students to the key principles of information security namely confidentiality, integrity and availability and their application in various real world scenarios. Topics covered include IT law, international standards, security policies, procedures, processes to protect IT systems against cyber-attacks and information breaches and the architecture and organisation of the digital components of a computer system.


This subject introduces students to coding principles and practices using an object-oriented approach. Topics covered include objects and classes, composition, inheritance, simple data structures, and testing of programs.


This subject introduces students to developing an IT application using the latest technologies.  Topics covered include application architecture, design, and development as well as testing.


This subject introduces students to the architecture and organisation of the digital components of a computer or mobile device. Topics covered include the basic functions provided in modern operating systems, such as concurrency, memory management, and file systems


This subject introduces students to the fundamentals of recursion and data structures in solving problems using a programming language. Topics covered include stacks, queues, linked lists and trees. Searching techniques and sorting algorithms will also be covered.


This subject introduces you to the theoretical and psychological perspectives of human behaviour. It will examine the psychological factors that relate to deviance and crime on a general level with specific focus on offences conducted with the assistance and use of digital and computer technology. Through this subject, you will be able to appreciate the contribution of psychology and apply it to an investigative process model.


The subject provides professionals in the computer forensics industry with an understanding of criminal procedure in Singapore. It also covers the law relating to computers.


This subject covers the concept and techniques required to discover and investigate evidence from various digital storage devices. Topics include using common tools and commercial toolsets for extraction and analysis of digital evidence. Network traffic capture and analysis will also be discussed and investigated for the tracing of specific information and source of attacks.


This subject introduces the principles of the most common media types and file systems found in operating systems and other digital media types.


This subject introduces you to the methodology and techniques of analysing multiple sources of digital evidence to determine the cause and effect of an incident. The topics in the subject include the application of best practices and techniques to relate digital evidence to cybercrimes. You will review various case facts to determine how they are related to a crime, reconstruct an incident as well as produce and present findings in a manner that is acceptable to a court of law. You will also go through case examples on best practices and how cause and effect were derived during an investigation.


This subject covers the traffic analysis of data sources from various network equipment and systems, such as Web proxies, firewalls, intrusion detection systems, routers and switches, which may contain evidence that can be used to solve a security incident. The topics included are the design and implementation of a secured enterprise network, as well as the analysis of network traffic and logs collected from different data sources in a network to understand attacks and trace suspect activities.


This subject focuses on secure web application design and development. It discusses the inherent threats and vulnerabilities of web applications and the corresponding countermeasures. In addition, it includes industry best practices such as OWASP (Open Web Application Security Project) Top Ten Web Application Vulnerabilities.


This subject covers the concept and techniques required to configure and administer a typical networked server using common operating systems in the industry. Topics include installation of a server system, configuration of devices, disks and file systems with security configuration of Local Area Network (LAN) and Wide Area Network (WAN) environments. Administering of key server services, using various tools and system scripting to monitor and analyse its performance and security will be discussed and applied. The subject also covers the concepts of encryption methodology, Public Key Infrastructure, key distribution and authentication.


This subject covers the policies, plans and procedures for computer security incident response of events such as denial of service, malicious code and authorisation access. It establishes proper processes for assessing the impact of incident on business and implements effective methods of collection, analysis and reporting of data.


This subject covers analysing real-world problems from the perspective of a digital forensics investigator. It will also include proposing and implementing a solution which involves the use of problem analysis, design and development, implementation and testing, project management, presentation, and interpersonal skills.


Diploma Subjects – Elective Subjects

Subject code Subject LevelCredit Units

This subject covers the investigation of applications such as web browsers, word processors and standalone executables, as well as Internet applications such as emails and social networking websites, in the context of digital forensics. These applications may be used for illegitimate means or to introduce malicious software into a computer system. In these cases, digital forensic analysis would be carried out to determine the source and extent of the damage.


This subject covers three main areas: Mobile Device Forensics, Image & Video Forensics, and Correlation & Artificial Intelligence. You will be using different tools to extract and analyse digital media data from various mobile devices. Fundamental elements of digital photos and digital videos will also be taught. Different image and video enhancement techniques to process evidence for investigation will be covered. Matching and correlation techniques, including the use of artificial intelligence, will be covered as well.


The subject covers the security risks associated with the deployment and use of enterprise level server operating systems as well as services such as email, database, secure wired and wireless access and web. The subject teaches assessment of security risks when these systems are integrated and conducting penetration testing and incident response to ensure the integrity and security of the enterprise systems.


This subject covers the key processes from project initiation to project closure such as project planning, project monitoring and control, resource management, project implementation and closure.


This subject covers topics such as security trends and technologies in the industry, the types of innovation, key elements of innovation and innovation skills required to move progressively from idea to impact. It discusses topics on security innovation relating to the methods, ideas, production, market needs, effective processes, impact and needs of customers.


Graduation Requirements

Cumulative Grade Point Average min 1.0
TP Core Subjects 23 credit units
Diploma Subjects
- Core Subjects
- Elective Subjects

89 credit units
min 8 credit units
Cross-Disciplinary Subjects min 9 credit units
Total Credit Units Completed min 129 credit units

Cross-Disciplinary Subjects

Students are required to obtain a minimum of 9 credit units from the list of Cross-Disciplinary Subjects.


Contact Us

For general enquiries, please contact:

Temasek Polytechnic
School of Informatics & IT
21 Tampines Avenue 1
Singapore 529757

  (65) 6780 5158
  (65) 6789 6872

Related courses that may interest you too: