Wirtualny spacer

ADMISSION IS OPEN

UNDERGRADUATE PROGRAMS BACHELOR’S DEGREE

Cybersecurity

Specialized learning program within the Information Technology program

STUDY ORGANIZATION: FULL-TIME
DURATION OF STUDIES: 6 Semesters
ADMISSION: 20.04.2026 – 31.07.2026
SCORED SUBJECTS:

Required: Polish language, Mathematics, Foreign language
Additional points awarded: Physics with Astronomy or Information Technology

Tuition fee per month

(PAYABLE OVER 5 MONTHS PER SEMESTER)

1390 zł

FULL-TIME

Classes are held from Monday to Friday

WANT TO RECIEVE
A SCHOLARSHIP?

CHECK YOUR DISCOUNT

ADMISSIONS ARE OPEN UNTIL 31 JULY 2026

KEY ADVANTAGES OF THE PROGRAM

Why study CYBERSECURITY at UITM?

You learn in a SOC environment that mirrors real-world operations

You learn in a SOC environment that mirrors real-world operations

In a unique cybersecurity laboratory, during your classes you take on the role of a SOC analyst. You work in an environment that replicates a real Security Operations Center: you analyze incidents, detect anomalies, and respond to attacks in real time. On your screens, you follow the Common Operating Picture (COP), monitor a live environment, and make decisions. You learn to use SIEM tools and work as part of a team under pressure. The laboratory was created in collaboration with Splunk and Cisco, whose technologies are used by leading companies and government institutions worldwide. This is practical cybersecurity—not just theory—exactly what IT and security employers expect.

Cisco and Splunk – industry leaders support your skills development

Cisco and Splunk – industry leaders support your skills development

You benefit from the resources of one of the largest Cisco Networking Academy centers in Poland. You complete programs such as CCNA, CyberOps, and DevNet, working on the NetLab platform and Cisco equipment. You learn network configuration, security, and penetration testing—gaining concrete skills in cybersecurity and computer networks. The program also includes elements of cloud computing (AWS Academy) and Linux system administration (Red Hat Academy). You also gain access to technologies from Splunk, a global leader in data analytics and cyber threat detection, and one of the most valued enterprise data protection systems. WSIiZ is an educational partner and a member of the Splunk Academy. Here, you learn using enterprise-class tools and gain unique, industry-relevant skills.

Preparation for in-demand industry certifications as part of your studies

Preparation for in-demand industry certifications as part of your studies

During your studies, you prepare for recognized certifications such as Cisco Certified Support Technician – Cybersecurity, CCNA, CCST Networking, DevNet Associate, AWS Cloud Practitioner, and LPI Linux Essentials Professional Development. The curriculum is aligned with exam requirements, so you learn exactly what matters on the job market—especially in cybersecurity, where certifications are a real recruitment filter. Here, under the guidance of experienced experts and researchers, you gain structured preparation in one place—something that is often scattered across multiple expensive courses. Additionally, you can earn micro-credentials with digital badges to validate your skills.

You get involved in the industry from the first semester

You get involved in the industry from the first semester

In the Cybersecurity program at WSIiZ, you stay in contact with the industry at every stage of your studies. The curriculum is co-created by industry experts, who also conduct your classes, workshops, and MasterClasses. You can meet them during internships, traineeships, and study visits at WSIiZ partners. Thanks to continuous cooperation with technology partners, you learn how to solve real, practical problems — from configuring security systems to analyzing incidents. As a result, you gain solid, up-to-date skills that are in demand in public institutions, security services, and private companies. You acquire knowledge that you can immediately apply at work.

You gain modern cybersecurity specialist skills

You gain modern cybersecurity specialist skills

You learn how to secure networks, operating systems, cloud environments, and IoT. You master real solutions and scenarios, including VPNs, firewalls, and endpoint protection. You also explore how artificial intelligence impacts cybersecurity—both in attacks (e.g., automated phishing) and in defense (behavioral analysis, SOC). As a result, you develop future-ready skills that are increasingly required in IT security job offers. All of this is based on technologies from Cisco, Amazon Web Services, and Red Hat—the same solutions used by companies and organizations worldwide. Among other reasons, this is why as many as 92% of first-year students rate the university positively, and 96% are satisfied with their field of study.

You gain a career with high earning potential and long-term stability

You gain a career with high earning potential and long-term stability

Cybersecurity specialists earn an average of PLN 15,000 net per month, while experienced professionals can reach PLN 25,000–30,000. It is one of the best-paid and most in-demand professions. Here, you gain skills that the market truly values. What’s more, you are not limited to a single specialization. After graduation, you can work as a SOC analyst, network security specialist, cloud security expert, or cybersecurity support engineer—giving you real career flexibility. Rzeszów is rapidly developing as an increasingly important IT hub (startups, shared service centers, aerospace and tech companies), so studying Cybersecurity at WSIiZ gives you access to a dynamic job market—both locally and globally, as this profession is in demand worldwide.

CURRICULUM PROGRAM

Check what you will learn

On the dedicated Cybersecurity learning path, from your very first classes you focus on hands-on practice: you analyze data, detect threats, and work with the latest tools used in the IT industry. You learn programming, the basics of AI, and system protection mechanisms in the context of real-world applications. You study using up-to-date technologies that you will apply in your future work as a cybersecurity specialist and in the broader IT field.

Your study program has been developed in collaboration with IT industry practitioners, which is why you build skills aligned with current employer expectations. You work on projects, in teams, through workshops and case studies, where you learn to analyze situations, make decisions, and solve problems. This is hands-on preparation for a career in cybersecurity—giving you concrete skills and a strong start in the job market.

64%

of the study program consists of PRACTICAL courses

36%

 of classes in the study program are THEROETHICAL

Fundamentals of Cybersecurity

In this course, you will learn key concepts, definitions, standards, guidelines, best practices, regulations, and legal frameworks related to cybersecurity. You will also explore organizations and institutions responsible for ICT security, types of information, classification levels, and the core principles of information protection.

Network Security

You will learn the principles that protect networks and data from breaches, intrusions, and other threats. You will explore hardware and software solutions, as well as processes, policies, and configurations related to network usage, availability, and overall protection.

Cloud Security

In this course, you will learn about procedures, policies, and technologies that protect cloud computing environments from cyber threats, ensuring data integrity and the security of cloud models during attacks or breaches.

Networking Technologies 2

This is an advanced course in network configuration and administration. You will gain practical skills in managing local and wide area networks, as well as administering network resources and internet services.

Cloud Technologies

You will explore cloud computing concepts, including configuration, service delivery, data storage and processing, and cloud security.

Ethical Hacking

You will learn how to test systems for vulnerabilities and protect them against threats. The course covers key topics such as penetration testing, network security, and threat analysis—essential for IT and security roles focused on protecting data and networks.

Databases

You will gain knowledge and skills in designing, implementing, and managing databases, with a strong focus on SQL.

Algorithms and Data Structures

You will learn how to design algorithms and build data structures such as arrays, lists, and graphs. The course also covers implementation and computational complexity analysis.

Computer Systems Architecture

You will learn how computers work, including memory organization and microcontroller programming. You will also gain experience with industry-standard technologies widely used by companies developing internet-based solutions.

Object-Oriented Programming

You will explore object-oriented programming principles in languages such as C#, C++, and Java. You will learn about class design, inheritance, polymorphism, aggregation, and interface design.

Software Engineering

You will gain knowledge of the software development lifecycle, requirements engineering, and methods of software validation and verification, as well as the fundamentals of design patterns.

Studia ___ na kierunku ___ dają szansę rozwinięcia indywidualnych predyspozycji na atrakcyjnych specjalnościach.

No item to display

Would you like to study this program?

Join UITM and gain practical skills that will give you a competitive edge in the job market.

CAREER
CAREER PROSPECTS

Check out the positions and sectors where Cybersecurity graduates from UITM work!

IT Security SpecialistSecurity EngineerPenetration Tester (Ethical Hacker)Computer Network DesignerSystems and Network AdministratorIncident Management SpecialistSystems and Network Auditor
Career paths after studying CYBERSECURITY: reports, research, and analysis
 
74%

of CEOs are concerned about their company’s ability to prevent damage caused by a cyberattack.

 
36%

of global business leaders have identified investment in AI as a cybersecurity priority.

 
70%

of security experts predict an increase in demand for cybersecurity specialists this year.

EXPLORE THE POSSIBILITIES!

Follow your college’s fan page

PROGRAM PARTNERS

COLLABORATION
WITH THE BUSINESS

On the dedicated Cybersecurity learning path at WSIiZ, you are close to the IT security industry from the very beginning. You interact with companies and institutions that are actively involved in protecting data and systems. Through collaboration with partners, you gain access to internships, placements, and projects where you solve real cybersecurity challenges. You learn from practitioners, develop your skills, and build a professional network that genuinely supports your career start.

Cisco

STRATEGIC PARTNER

A global IT leader and a university partner for 25 years. WSIiZ holds the status of Cisco Academy Training Center, Academy Support Center, and Instructor Training Center. Students benefit from authorized Cisco courses, internationally recognized certifications, and specialized workshops in cybersecurity, programming, AI, and IoT. Joint projects and laboratories prepare you for professional-level work.

Splunk

STRATEGIC PARTNER

A global leader in data analytics and cybersecurity. Splunk delivers advanced solutions for monitoring, analysing, and securing data from IT systems, applications, and IoT devices. Through this partnership, students gain access to enterprise-class tools, develop in-demand skills, and participate in real-world, development-focused projects.

Polish Information Processing Society (PTI)

STRATEGIC PARTNER

One of the most important industry organizations in Poland, bringing together IT and information technology professionals. Established in 1981, its mission is to support the development of IT in Poland and promote high ethical and professional standards among IT specialists.

Clico

Operating since 1991, CLICO is the largest specialized value-added distributor (VAD) in Poland and Central and Eastern Europe. The company is a leader in delivering advanced technologies in cybersecurity, network infrastructure, and IT management.

Centralne Biuro Zwalczania Cyberprzestępczości (Polish Police)

A national police unit dedicated to combating cybercrime. It identifies, prevents, and investigates crimes involving IT systems and networks, and prosecutes offenders. The unit primarily recruits individuals with strong IT and cybersecurity competencies. Thanks to this partnership, educational collaboration is possible within this field of study.

TÜV NORD

A global corporation operating for over 140 years across all continents. It specializes in certification services, including cybersecurity certifications. As part of its cooperation with WSIiZ, TÜV NORD experts conduct laboratory classes and co-develop research projects.

4Prime

A company providing comprehensive cybersecurity solutions. Its teams detect and respond to security incidents 24/7 and conduct penetration testing. 4Prime serves clients across public, financial, industrial, telecom, healthcare, and e-commerce sectors. Through this partnership, the university receives expert support in developing the Cybersecurity specialization.

EXPERT OPINION

Cybersecurity: Your future in a dynamic industry

„In the face of a growing number of cyberattacks, the demand for IT security specialists continues to rise. According to recent reports, the demand for cybersecurity professionals is growing twice as fast as the available talent pool. The practical and career-focused Cybersecurity program at WSIiZ prepares experts in protecting IT systems from threats. Gain the knowledge and skills that will enable you to safeguard the digital world.”

Dr inż. Janusz Kolbusz - Prodziekan

Janusz Kolbusz, PhD, Eng.

Cybersecurity - Bachelor’s Degree - Expert Opinion

Meet our selected lecturers

Find out who you will meet in the classes of the Bachelor’s in CYBERSECURITY program at UITM!

A specialist in electrical engineering and mathematics. Author of 6 patents and 10 computer programs, including SOLAR Matlab and the C++ program ATES. He has collaborated academically with Ohio University as well as with companies such as Magnetek Corporation and Magnolia Broadband. He combines extensive theoretical knowledge with practical applications in engineering and IT. During his seminars and lectures, you will learn how to design “brains” for robots, autonomous systems, and virtual environments.

An expert in cybersecurity, as well as the design, configuration, and operation of computer networks. He will teach you how to detect threats in real time, analyze network traffic for attacks, and secure systems—including IoT devices—against intrusions. He trained at Cisco Academy Training Centers at Budapest Polytechnic, the University of Central England, the Advance Technology Consortium (Romania), and the Cisco Learning Institute. A Cisco Academy instructor and instructor trainer, he delivers courses such as CCNA Cybersecurity, CCNA, CCNP, CCNA Security, Operations, and IoT Fundamentals. His academic work focuses on intelligent systems and networks.

A specialist in electrical engineering and mathematics. Author of 6 patents and 10 computer programs, including SOLAR Matlab and the C++ program ATES. He has collaborated academically with Ohio University as well as with companies such as Magnetek Corporation and Magnolia Broadband. He combines extensive theoretical knowledge with practical applications in engineering and IT. During his seminars and lectures, you will learn how to design “brains” for robots, autonomous systems, and virtual environments.

An expert in cybersecurity, as well as the design, configuration, and operation of computer networks. He will teach you how to detect threats in real time, analyze network traffic for attacks, and secure systems—including IoT devices—against intrusions. He trained at Cisco Academy Training Centers at Budapest Polytechnic, the University of Central England, the Advance Technology Consortium (Romania), and the Cisco Learning Institute. A Cisco Academy instructor and instructor trainer, he delivers courses such as CCNA Cybersecurity, CCNA, CCNP, CCNA Security, Operations, and IoT Fundamentals. His academic work focuses on intelligent systems and networks.

The commencement of a given degree programme or specialisation by the University is contingent upon enrolling the required (and, in exceptional cases, limited) number of candidates. The conditions for launching a programme or specialisation are specified in the Admission Regulations and in the Regulations on Tuition Fees for Studies and Other Forms of Education. The University reserves the right to change the instructors assigned to individual courses.

The information provided on this website is for informational purposes only and does not constitute an offer within the meaning of Article 66 and Article 66(1) of the Polish Civil Code.

Czy wiesz, że Wyższa Szkoła Informatyki i Zarządzania w Rzeszowie należy do czołówki najlepszych uczelni w Polsce? Oferujemy kształcenie praktyczne, dostosowane do trendów panujących na rynku pracy. Badania dowodzą, że nasi absolwenci szybko znajdują dobrze płatną pracę i są zadowoleni ze studiów.

ul. mjr. Henryka Sucharskiego 2

35-225 Rzeszów

Telefon: 17 866 11 11

E-mail: wsiz@wsiz.edu.pl