For general inquiries, Admissions, and Registrar's Office:
Financial Aid Office
855.323.9235International Students
1.518.464.8500TDD
1.518.464.8501Begin or continue your application
Enter your student portal
Having Trouble? Visit our help page.
View our site in English or Spanish.
Do you look at Facebook every day? How about Outlook and Instagram and Twitter and Snapchat and Gmail? Sure, we all do, but what about your Excelsior College Message Center? ….
Posted on October 4, 2016
By Amy Erickson About five years ago, one university encouraged instructors and staff to create Twitter accounts. Unfortunately, the instructors and staff weren’t given any guidance as to how or ….
Posted on September 29, 2016
How do people experience being ill, and how does it change their lives? Children, parents, family, friends, and even we, ourselves, will struggle with sickness, disease, and death. People do ….
Posted on September 23, 2016
By all accounts, technology giant Yahoo was the target for a major breach in 2014 in which attackers stole as many as 500 million accounts. That’s right…500 million accounts! Bob ….
Posted on September 23, 2016
“Europe today is a powder keg and the leaders are like men smoking in an arsenal … A single spark will set off an explosion that will consume us all ….
Posted on September 15, 2016
Some people say the happiest day of their lives is their wedding day. As someone who has yet to get married I can without a doubt say the happiest day ….
Posted on September 14, 2016
By Bonny Kehm, PhD, RN Faculty Program Director, BS in Nursing Program What are the elements of a well written paper? Begin by taking a look at the assignment and ….
Posted on September 12, 2016
Open Educational Resources (OER) are a trend in distance learning with a cost savings benefit for students. Kimberly Barss, Interim Lead Instructional Designer at Excelsior College’s Center for Online Education, ….
Posted on August 31, 2016
Vehicles have notoriously been vulnerable to attack from various sources. These have varied from the equipment, endpoints, and communication being insecure to open ports. Regardless of the source, these have ….
Posted on August 19, 2016
Years ago, a business could plan to secure its enterprise. The IT department would harden the system and in most cases there would be a reasonable assurance the enterprise was ….
Posted on August 17, 2016