ADMISSION IS OPEN
UNDERGRADUATE PROGRAMS BACHELOR’S DEGREE
Specialized learning program within the Information Technology program
Required: Polish language, Mathematics, Foreign language
Additional points awarded: Physics with Astronomy or Information Technology
(PAYABLE OVER 5 MONTHS PER SEMESTER)
1390 zł
FULL-TIME
Classes are held from Monday to Friday
WANT TO RECIEVE
A SCHOLARSHIP?
ADMISSIONS ARE OPEN UNTIL 31 JULY 2026
KEY ADVANTAGES OF THE PROGRAM
CURRICULUM PROGRAM
On the dedicated Cybersecurity learning path, from your very first classes you focus on hands-on practice: you analyze data, detect threats, and work with the latest tools used in the IT industry. You learn programming, the basics of AI, and system protection mechanisms in the context of real-world applications. You study using up-to-date technologies that you will apply in your future work as a cybersecurity specialist and in the broader IT field.
Your study program has been developed in collaboration with IT industry practitioners, which is why you build skills aligned with current employer expectations. You work on projects, in teams, through workshops and case studies, where you learn to analyze situations, make decisions, and solve problems. This is hands-on preparation for a career in cybersecurity—giving you concrete skills and a strong start in the job market.
64%
of the study program consists of PRACTICAL courses
36%
of classes in the study program are THEROETHICAL
In this course, you will learn key concepts, definitions, standards, guidelines, best practices, regulations, and legal frameworks related to cybersecurity. You will also explore organizations and institutions responsible for ICT security, types of information, classification levels, and the core principles of information protection.
You will learn the principles that protect networks and data from breaches, intrusions, and other threats. You will explore hardware and software solutions, as well as processes, policies, and configurations related to network usage, availability, and overall protection.
In this course, you will learn about procedures, policies, and technologies that protect cloud computing environments from cyber threats, ensuring data integrity and the security of cloud models during attacks or breaches.
This is an advanced course in network configuration and administration. You will gain practical skills in managing local and wide area networks, as well as administering network resources and internet services.
You will explore cloud computing concepts, including configuration, service delivery, data storage and processing, and cloud security.
You will learn how to test systems for vulnerabilities and protect them against threats. The course covers key topics such as penetration testing, network security, and threat analysis—essential for IT and security roles focused on protecting data and networks.
You will gain knowledge and skills in designing, implementing, and managing databases, with a strong focus on SQL.
You will learn how to design algorithms and build data structures such as arrays, lists, and graphs. The course also covers implementation and computational complexity analysis.
You will learn how computers work, including memory organization and microcontroller programming. You will also gain experience with industry-standard technologies widely used by companies developing internet-based solutions.
You will explore object-oriented programming principles in languages such as C#, C++, and Java. You will learn about class design, inheritance, polymorphism, aggregation, and interface design.
You will gain knowledge of the software development lifecycle, requirements engineering, and methods of software validation and verification, as well as the fundamentals of design patterns.
Studia ___ na kierunku ___ dają szansę rozwinięcia indywidualnych predyspozycji na atrakcyjnych specjalnościach.
No item to display
Join UITM and gain practical skills that will give you a competitive edge in the job market.
Check out the positions and sectors where Cybersecurity graduates from UITM work!
of CEOs are concerned about their company’s ability to prevent damage caused by a cyberattack.
of global business leaders have identified investment in AI as a cybersecurity priority.
of security experts predict an increase in demand for cybersecurity specialists this year.
EXPLORE THE POSSIBILITIES!
Follow your college’s fan page
PROGRAM PARTNERS
EXPERT OPINION
„In the face of a growing number of cyberattacks, the demand for IT security specialists continues to rise. According to recent reports, the demand for cybersecurity professionals is growing twice as fast as the available talent pool. The practical and career-focused Cybersecurity program at WSIiZ prepares experts in protecting IT systems from threats. Gain the knowledge and skills that will enable you to safeguard the digital world.”
Janusz Kolbusz, PhD, Eng.
Find out who you will meet in the classes of the Bachelor’s in CYBERSECURITY program at UITM!
A specialist in electrical engineering and mathematics. Author of 6 patents and 10 computer programs, including SOLAR Matlab and the C++ program ATES. He has collaborated academically with Ohio University as well as with companies such as Magnetek Corporation and Magnolia Broadband. He combines extensive theoretical knowledge with practical applications in engineering and IT. During his seminars and lectures, you will learn how to design “brains” for robots, autonomous systems, and virtual environments.
An expert in cybersecurity, as well as the design, configuration, and operation of computer networks. He will teach you how to detect threats in real time, analyze network traffic for attacks, and secure systems—including IoT devices—against intrusions. He trained at Cisco Academy Training Centers at Budapest Polytechnic, the University of Central England, the Advance Technology Consortium (Romania), and the Cisco Learning Institute. A Cisco Academy instructor and instructor trainer, he delivers courses such as CCNA Cybersecurity, CCNA, CCNP, CCNA Security, Operations, and IoT Fundamentals. His academic work focuses on intelligent systems and networks.
A specialist in electrical engineering and mathematics. Author of 6 patents and 10 computer programs, including SOLAR Matlab and the C++ program ATES. He has collaborated academically with Ohio University as well as with companies such as Magnetek Corporation and Magnolia Broadband. He combines extensive theoretical knowledge with practical applications in engineering and IT. During his seminars and lectures, you will learn how to design “brains” for robots, autonomous systems, and virtual environments.
An expert in cybersecurity, as well as the design, configuration, and operation of computer networks. He will teach you how to detect threats in real time, analyze network traffic for attacks, and secure systems—including IoT devices—against intrusions. He trained at Cisco Academy Training Centers at Budapest Polytechnic, the University of Central England, the Advance Technology Consortium (Romania), and the Cisco Learning Institute. A Cisco Academy instructor and instructor trainer, he delivers courses such as CCNA Cybersecurity, CCNA, CCNP, CCNA Security, Operations, and IoT Fundamentals. His academic work focuses on intelligent systems and networks.
DISCOVER MORE
The commencement of a given degree programme or specialisation by the University is contingent upon enrolling the required (and, in exceptional cases, limited) number of candidates. The conditions for launching a programme or specialisation are specified in the Admission Regulations and in the Regulations on Tuition Fees for Studies and Other Forms of Education. The University reserves the right to change the instructors assigned to individual courses.
The information provided on this website is for informational purposes only and does not constitute an offer within the meaning of Article 66 and Article 66(1) of the Polish Civil Code.