E-learning
- Flexible Degree Programs
- Work-Study Balance maintained. Custom Payment Plan for our Students
- Top Programs Offered
- Enroll In 75+ Top Degree Programs. Our Programs are Accredited And Recognized Worldwide.
- Special 80% Grant
- Earn our Exclusive Scholarships. Sign Up Now and Avail Grant Instantly!
- Past Credit Utilization
- Convert Experience Into Credits. Easy Credit Transfer Policy Available.
E- learning
Making an Application
Who can apply using the online process?
Applicants who have an Irish Personal Public Service Number (PPSN) or a National Insurance Number from
Northern Ireland may apply. All other applicants must contact the college/centre directly in order to apply.
How do I apply for a course?
Click here: Apply Online
Please select the course that you wish to apply for.
Please identify if you hold or are not a holder of a PPSN number.
Select the appropriate centre/college.
Register (Create Account) if it
is your first time, otherwise sign in.
Complete application details as required.
Click Submit to complete and submit your application form.
All other applicants must contact the centre/college directly to apply.
What documents do I need to apply?
You will need to supply copies of Birth Certificate, proof of PPSN & driving licence if
applicable.
If you are under 18 years of age, your parent/guardian must download, complete, sign and upload the . All other college documentation, including College Learner Handbooks can be accessed here.
How do I request Learner Support?
UCSS is an equal opportunities organisation and welcomes applications
UCSS from people with disabilities. is committed to supporting students with disabilities within the learning environment. Disclosure of a disability will in no way prejudice your application but rather help us to plan and provide the necessary supports.
It is important to indicate on your application that you have a learning difficulty or disability. You should also contact the relevant Access
Officer to discuss your individual learning difficulty / disability.
Request for learner support or further information is available by contacting the relevant college/centre.
Can I Save and Exit my application?
Yes. You can save and exit at any stage of the application process. You can log back in to complete your application at any time.
How can I log back in and complete my application?
Click on the UCSS Student Portal. You will need to enter your username and password to proceed.
Once signed in, you will see your application and its status. Select the application to be completed.
An application that was successfully submitted, will state ‘Submitted’ beside it.
What is my application number?
It is a unique number assigned to your application. Your application number is contained in the email sent to you after submitting your application.
How do I submit an application?
You must click on “Submit” which is available at the end of the form. Please review your application to ensure
that it is fully completed before you submit it.
Your application will not be sent until you click the Submit button.
How do I know that I have submitted my application successfully?
You will receive an email confirming that it was submitted successfully.
Can I submit a paper application form?
No. Applications can only be made online using the UCSS Student Portal.
Applicants (EU and International) must contact the centre/college directly to apply.
What happens to my application once it is submitted?
You will receive an email confirming that your application has been submitted. Your application
will be reviewed and processed accordingly. All communication regarding the status of your application will be sent to you via email.
How do I check my application status?
You must login to the UCSS Student Portal to check for updates on your application. It is important that you check your emails regularly.
Can I view my application after I have submitted it?
Yes. You can log onto the UCSS Student Portal at any stage. This will show your application status and any updates from the college.
Accessing the student portal
Click on the link to open
UCSS Student Portal
Do I need to register to apply for a course?
Yes. If you do not already have an account then you will need to create an account using the ‘New Account’ button.
Do I need to provide an email address?
Yes. You must provide an active email address. Please ensure that you use your own
personal email account when registering. All updates regarding your application will be communicated to you via this email.
What do I do if I forget my sign in details?
You can use “I forgot my sign in details” on the main application page.
You will need to enter your username (email). Your account password will be
reset and details will be sent to the email address provided. Please note UCSS will never email or contact you requesting your student portal login details.
Managing your Application
When is the online application system open for Level 5 applications?
Level 5 full time courses are
open for online applications from the 12th November, 2021.
Level 6 full time courses will be open for online applications - date to be confirmed.
When will courses close for applications?
The Level 5 DIPLOMA in applications close at midnight on 30th June, 2022.
For all other closing dates,
please refer to the individual online course application.
Can I apply to more than one college for the same course?
Yes you can apply to more than one college for the same course.
Simply select the relevant course at the college you wish to apply to, sign into the UCSS Student Portal using your Username and Password and submit an application.
The UCSS Student Portal will have retained your personal information so this will be pre-populated for you.
Application Fee
There is no application fee for this course.
Who do I contact if I have a query about my online application?
Contact the college to which you applied.
Do I have to create a new account every time I want to apply for a course?
No – just click on the course application link you wish to apply to and sign into the UCSS Student Portal using your username and password.
Can I change my mind?
Yes. You can submit applications up to the closing date. If you have applied:
to the wrong course or to the
wrong college/centre you can apply for another course by selecting the correct course / centre on the UCSS website.
Can I edit my application after I have submitted it?
No. It is not possible to edit your application once it has been submitted. If there is additional information you wish to include you can contact the relevant college via email.
Can I withdraw my application after it is submitted?
Yes. If you wish to withdraw your application, please contact the centre to which you have applied by email, quoting your application reference number and ID number.
How do I know if I have an offer of a place?
Offers of places are made to the email you supplied.
How do I accept an offer of a place?
You can accept an offer of a place using the UCSS Student Portal. An email with instructions will be issued to you from the admissions office.
When do I pay the course charge?
Course charges must be paid in full before the course commences.
How do I pay the course charge?
The course charge can be paid by credit or debit card online. Payment details will be included with the offer of a place.
Is a deposit payable for my course?
No
Can I get a refund?
Before course
commencement:
The learner must confirm by email/in writing that s/he wishes to cancel their place before the start of the course. An administration fee of €100 will be retained by UCSS and the balance of the fee will be refunded to the learner. For component awards, an administration fee of €50 (per component award) will be retained by UCSS.
After course commencement:
?
Ÿ FULL TIME PROGRAMMES
Course charges are not refunded after the 30th September.
Ÿ DISTANCE EDUCATION/PART TIME PROGRAMMES
Course charges are not refunded.
However in exceptional circumstances the College
Principal/Regional Manager may decide to make a partial refund in some force majeure circumstances. An administration charge of €100 must be retained by UCSS at a minimum. For component awards, an administration fee of €50 (per component award) will be retained by UCSS.
The Academy of Information Technology announces enrolment for the second degree studies inInformation Technology in the following specializations:
- Network infrastructure management
- Databases
Bachler in Business Management
- Travel,Tourism & Hospitality Management
- Hospital Management
- Bank & Insurance Management
- Clenical Management
Bachler in IT
- Computer Art design
- Software engineering
- Information Technology
- Database
- Teleinformatics
- Interiar design
- Cyber security
PG Diploma
- Interiar design
- Hotel Management
- Lab Technician
- Teachers Training
- Cosmetology
- Radiology
- Bank & Insurance Management
- Hospital Management
- Business Management
Postgraduate
- MSc in computer science
- MSc in Computer art design
- MSc in Software Engineering
- Masters of Business Administration
The studies are conducted under the distance learning programme. The offer is addressed to graduates of engineering studies in Information Technology. When completing the studies graduates are awarded the title of Master of Science in Engineering (MSE).
The prerequisite for admission to the studies is to hold the diploma of Information Technology Engineer.
The course is conducted based on a distance learning Internet platform with use of techniques that enable students to connect with the Academy’s computers and other IT resources via Internet. Students must be physically present only to the extent specified for this particular type of studies by the Ministry of Science and Higher Education.
LIFE AT UCSS
- Around Campus
- Housing and Dining
- Health and Wellness
- Sustainability
- Athletics and Recreation
- Student Life
- Merchandise
- UCSS Discount Program
- On-Campus Services
- Commercial Outlets
- ID Cards and Car Stickers
- Governmental Services
- IT Services
- IT Support Services
- Infrastructure Services
- Management Information Systems
- Information Security Services
- IT Policies
- Library
- Early Childhood Learning Center
- Human Resources
- Blog
IT POLICIES
These policies apply to the use of computers and networks at University of Computer Science & Skills Lodz Poland, and of computers and networks elsewhere if you use University of Computer Science & Skills Lodz Poland resources to gain access to those computers or networks. Below are some of our IT polices. You can find a more comperhensive list of IT policies and procedures here
here (login required.)
ACCEPTABLE USE POLICY
1. Overview
The University of Computer Science & Skills Lodz Poland, (UCSS) IT Department’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to UCSS’s established culture of openness, trust and integrity. The IT Department is committed to protecting UCSS's students, faculty, staff, partners and the university from illegal or damaging actions by individuals, either knowingly or unknowingly.
Internet/Intranet/Extranet-related systems, including but not limited to computer equipment, software, operating systems, storage media, network accounts providing electronic mail, WWW browsing, and FTP, are the property of UCSS. These systems are to be used for academic and business purposes in serving the interests of the university, and of our students, faculty and staff in the course of normal operations. Please review the Human Resources Policy Manual and the Student Code of Conduct for further details.
Effective security is a team effort involving the participation and support of every UCSS student, faculty, staff and affiliate who deals with information and/or information systems. It is the responsibility of every computer user to know these rules and guidelines, and to conduct their activities accordingly.
2. Purpose
The purpose of this policy is to outline the acceptable use of computer equipment at UCSS. These rules are in place to protect the students, faculty and staff and UCSS. Inappropriate use exposes UCSS to risks including virus attacks, compromise of network systems and services, and legal issues.
3. Scope
This policy applies to the use of information, electronic and computing devices, and network resources to conduct UCSS business or interact with internal networks and business systems, whether owned or leased by UCSS, the employee or a third party.
This policy applies to students, faculty and staff, contractors, consultants, temporaries, and other workers at UCSS, including all personnel affiliated with third parties. This policy applies to all equipment that is owned or leased by UCSS.
4. Policy
The use of UCSS resources outlined in the scope of this policy is subject to university policies and procedures, and local and federal laws and regulations. All users of these resources must comply with specific policies and guidelines governing their use. All users must only use these resources in a manner consistent with university policy and the law, including this policy and related procedure, and specialized policies created by specific departments, programs and offices of the university.
PROHIBITED ACTS AND PROPER RESOURCE UTILIZATION
The Information Technology Department (IT) is neither an investigative nor a disciplinary entity in its primary responsibilities. However, in cases where university resources and privileges are abused or otherwise threatened, the department may be asked to take appropriate steps. Immediate revocation of access and subsequent prosecution by the authorities, for example, might be directed. Such revocation may be appealed to the IT Steering Committee.
Another example would be to both discipline and hold accountable an individual who damages IT resources. Improper access or modification of UCSS information in a computer system may also bring a stiff penalty.
Prohibited acts include but are not limited to the following:
1. Intentional denial of computing service to other users.
2. Exploitation of insecure accounts or resources.
3. Attempting to guess, crack or otherwise determine another user's password.
4. Interception of network transmissions with hardware or software "sniffers."
5. Forging of electronic mail or electronic news or otherwise misrepresent themselves or other individuals in any electronic communication.
6. System administrators are not to use their access to examine the private information of other users except in the course of resolving problems and where access to such information is necessary. In these cases, IT staff are required to seek permission and oversight.
7. IT staff may not transfer resources (hardware, software, documentation, etc.) from designated locations without the explicit permission of their supervisor. The Supply Chain Department shall be notified of the movement and shall update the employee's inventory record accordingly.
8. UCSS employees or students may not load any software onto their workstations or servers that has not been purchased or is not free. Software identified as "shareware" should be examined carefully to ensure there is compliance with any licensing requirements. Under no circumstances will software binaries from unknown or illegal sources be placed on workstations or servers.
9. Under no circumstances will UCSS employees or students share account passwords, key combinations, alarm codes, keys, access cards or any other access control mechanism for any university resource or facility with any individual in a manner inconsistent with the policies established by their supervisor. In the absence of such policies, employees must have the explicit permission of their supervisor to share any access mechanism to any department resource.
10. UCSS staff or faculty who bring vendors or personal guests into UCSS IT facilities must make sure that these guests are escorted at ALL times with care given to protecting UCSS equipment, facilities and information.
11. IT management reserves the right to audit university-owned workstations and servers without warning for the purpose of verifying software-licensing compliance.
12. All computer and network access is denied unless expressly granted. Access is generally granted by the IT Department in the form of computer and network accounts to registered students, faculty, staff and others as appropriate for such purposes as research, education (including self-study), or university administration. University accounts are protected by passwords.
13. Accounts are assigned to individuals and are not to be shared unless specifically authorized. You, the user, are solely responsible for all functions performed from accounts assigned to you. Anything done through your account may be recorded. It is a violation of university policy to allow others to use your account. It is a violation to use another person's account, with or without that person's permission.
14. Your password, used with your account, is the equivalent of your electronic signature. The use of user ID and password authenticates your identity and gives your online affirmation the force of a legal document. You should guard your password and account as you would your checkbook and written signature. It is a violation of this policy to divulge your password to anyone. It is a violation to attempt to learn the password to another person’s account, whether the attempt is successful or not. Be sure that you check the Password Policy for further details on how to choose a strong password and keep it protected.
15. You may not attempt to disguise your identity, the identity of your account or the machine that you are using. You may not attempt to impersonate another person or organization.
16. You may not attempt to monitor other users' data communications; you may not infringe the privacy of others' computer files; you may not read, copy, change or delete another user's computer files or software without the prior express permission of the owner.
17. You may not engage in actions that interfere with the use by others of any computers and networks. Such conduct includes, but is not limited to, the placing of unlawful information on the system; the transmitting of data or programs likely to result in the loss of the recipient's work or system downtime; the sending of "chain letters" or "broadcast" messages to lists or individuals; any other use that causes congestion of the networks or interferes with the work of others.
18. You may not engage in actions that threaten or intentionally offend others, such as the use of abusive or obscene language in either public or private messages, or the conveying of threats to individuals or institutions by way of UCSS computers and/or networks.
19. You may not attempt to bypass computer or network security mechanisms without the prior express permission of the owner of that computer or network system. Possession of tools that bypass security or probe security, or of files that may be used as input or output for such tools, shall be considered as the equivalent to such an attempt.
20. You may not alter, copy or translate software licensed to another party. You may not make available copyrighted materials without the express permission of the copyright holder. Respect for intellectual labor is vital to the academic discourse. Violations of authorial integrity, plagiarism, invasion of privacy, unauthorized access, and trade secret and copyright violations may be grounds for university sanctions as well as legal prosecution.
To summarize, access to university computing and communications equipment and facilities may be revoked for reasons including, but not limited to:
- attacking the security of the system
- modifying or divulging private information such as file or mail contents of other users without their consent
- modifying or destroying university data, or
- using the networks in a manner contrary to the established guidelines
Finally, users may not read sensitive information simply because it is accessible to them—because of accidental exposure and/or through the malice of others who have broken into a system or are misusing their access privileges. When sensitive information is recognized as such, it should not be examined further, but reported to the keeper of the materials, if known, or reported to management, if not.
CONTACT:
Enrolment: Dean’s Office, Faculty of Information Technology
phone: +48 42 275-01-50/51/52
e-mail: rekrutacja@wsinf.edu.pl
FAQ
Is the title I’ll be awarded after completing the studies equal to the title awarded to traditional studies graduates?
Yes, it is. Our graduates will be awarded the title of Master of Science in Engineering, and the diploma will contain an information note on part-time (extra-mural) studies (just like in case of graduates of traditional extra-mural studies).
I have the diploma of Information Technology Engineer but I obtained it at some other higher school, not yours. Will I have any problems with taking up the second degree studies?
We don’t expect any problems. The first degree engineering studies at all higher schools in Poland should meet minimum curriculum requirements imposed by the Ministry of Science and Higher Education. Our studies programme assumes that the minimum requirements were satisfied and that it’s the only preparation that students have when commencing the second degree studies.
I’m a graduate of engineering studies but of some other major. Can I take up Master’s degree studies under distance learning programme at your Academy?
Unfortunately, we’re not planning to provide external complementary courses. It would be ineffective because of great curricular differences among potential applicants. We suggest to consult each particular case with the Dean, Faculty of Information Technology, at our Academy. In some not very complicated cases it’ll surely be possible to find some solution satisfying both parties.
How do educational contents of these studies compare to educational contents of traditional studies?
Both forms of studies, traditional and “distant” meet the requirements specified under the standards of the Ministry of Science and Higher Education. Distance learning studies last 3 semesters.
Are distance learning studies easier than traditional ones?
It’s difficult to answer this question explicitly. Undoubtedly, an advantage of external studies is that we can “study” when we want to, when we have time. It may be any time. We sit in front of our computer, download courses via Internet, read the theory, solve tasks. Moreover, in any doubts arise, we may contact our academic teacher by e-mail. On the other hand, this approach requires regular studying. We need to remember to find enough time for learning during the week. Lack of regularity may make us fall behind and then it’ll be very difficult to catch up at the end of semester.
Can I take up the studies if I don’t have Internet access?
This might be a problem. The Academy will prepare computer desks for such students, but necessarily they’ll be located in Lodz and in the Academy’s branches. Using computers with software which we can’t fully control (e.g. at Internet cafes) might be impossible since the right software cannot be installed on them.
What do you mean by “a course”? On what grounds will credits be given?
The word “course” is, in fact, synonymous to the notion of a subject in traditional type of studies. In the jargon of distance learning studies we use this term for set of educational resources such as electronic version lectures, self-study tasks, multimedia presentations and self-work instructions based on which credits are given. Moreover, there are dynamic elements variable depending on a course taken such as information gathered on a discussion forum related to a specific course, correspondence and announcements made by a person conducting the course and, finally, elaboration of solutions prepared by students. The whole students’ work records are saved on the platform, which provides tutors with grounds for fair assessment. In case of good and creative cooperation, a student’s meeting face to face with his/her tutor may be limited only to an informal conversation on the course subject, which is necessary for the tutor to make sure that while participating in the course the student worked on his/her own.