SlideShare a Scribd company logo
1 of 2
Download to read offline
Cybersecurity
Associate in Applied Science Degree • Certificate of Proficiency
A Stimulating and Dynamic Career
Information security analysts plan and carry out security measures to protect an
organization’s computer networks and systems. Their responsibilities are continually
expanding as the number of cyberattacks increases.
A career in the St. Louis Community College Cybersecurity Program is right for you if you:
 See yourself in a career that offers diverse opportunities.
 Would like to work in a growing Information Technology career.
 Have aptitude for problem-solving and ingenuity; are analytical, detail oriented.
 Enjoy the challenge of lifelong learning.
Want a career where you can continually adapt to stay a step ahead of cyberattackers, stay
Up to date on the latest methods attackers are using to infiltrate computer systems and on
IT security? With experience and security credentials hold solid potential for advancement
to management positions, especially when combined with a bachelor’s degree.
ABOUTTHEPROGRAM
The Cybersecurity program provides the
foundation courses to prepare IT
students to apply for entry level
information assurance/security
technician/practitioners positions that
support planning, implementing,
upgrading, and monitoring security
measures for the protection of
computer networks and information
systems. Students, through in-depth
theory and extensive hands-on
activities, will develop skills to ensure
appropriate security controls are in
place that will safeguard digital files and
vital electronic infrastructure, and will
develop skills to respond to computer
security breaches and viruses. Includes
instruction in computer architecture,
programming, and systems analysis;
networking; cryptography; security
system design; applicable law and
regulations; risk assessment and policy
analysis; contingency planning; user
access issues; investigation techniques;
and troubleshooting.
OPPORTUNITIES IN THIS FIELD
Most information security analysts
work for computer companies,
consulting firms, government agencies,
healthcare companies and business and
financial companies.
JOB OUTLOOK
According to the U.S. Bureau of Labor
Statistics (BLS), job prospects in
Information (Cyber) Security are set to
grow at a rate much faster than
average. Jobs are predicted to increase
by 18% before 2024. Information
security analysts with related work
experience will have the best
prospects.
SALARY INFORMATION
Information Security position salaries
vary by geographic location, amount of
education and experience, and the type
and size of the employer. According to
Missouri Economic Research and
Information Center, analysts typically
earn a mean annual salary of $77,090, in
our region, depending on the position,
with higher salaries in large metropolitan
areas. Students may visit
www.missourieconomy.org/oeswage for
more local salary information.
FEES
Pleasevisit www.stlcc.edu/fees for
the most current information.
Additional fees apply to some
courses. Fees are subjectto change.
CONTACT INFORMATION
Craig Chott, Program Coordinator,
314-644-9298, cchott@stlcc.edu
Brenda Kahan, Department Chair,
314-644-9229, bkahan@stlcc.edu
Cybersecurity
For more information on how to get
started on your career go to
www.stlcc.edu/getstarted.
ASSOCIATE IN APPLIED SCIENCE DEGREE
Certificate of Proficiency
AAS CP
Course Number Course Description Credit Hours
General Education
__ENG:101 College Composition 1 3
__ENG:102 College Composition II (or)
__ENG:103 Report Writing 3
__MTH:140 Intermediate Algebra 3
__MTH:186 Survey of Calculus 4
__XXX:xxx Natural Science/Mathematics Elective 3
__XXX:xxx Missouri State Requirement 3
__XXX:xxx Social Science Elective 3
Total General Education Credit Hours 19
__Physical Education Activity 2
Area of Concentration
__IT:100 Introduction to Cybersecurity 1 1
__IS:112 Software and Hardware Concepts 3 3
__IS:139 Web Publishing 3 3
__IS:153 C# Programming I (or)
__IS:187 Java Programming I 4 4
__IS:225 Database Management 4 4
__IS:229 Unix/Linux 1 3 3
__IS:237 Fundamentals of Information Assurance/Security 3 3
__IS:265 Web Scripting Technologies 3 3
__IT:101 Cisco Networking I: Introduction to Networks 5 5
__IT:120 Enterprise Security Management 3 3
__IT:121 Secure E-Commerce and E-Government (or)
__IS:264 Unix/Linux II 3 3
__IT:212 Ethical Hacking 3 3
__IT:214 Systems Security Engineering 3 3
__IT:216 Digital Forensics 3 3
Total Credit Hours for Program 65 47
Pre-employment background screening is required for any candidate seeking employment in the cybersecurity field. To be successful, persons interested in the program should
possess a strong foundation in computer hardware/software troubleshooting skills, equivalent to the CompTIA A+ certification.
St. Louis Community College is committed to non-discrimination and equal opportunities in its admissions, educational programs, activities and employment regardless of race, color, creed,
religion, sex, sexual orientation, national origin, ancestry, age, disability, genetic information or status as a disabled or Vietnam-era veteran and shall take action necessary to ensure non-
discrimination. For information or concerns relating to discrimination matters at a particular location, you may contact the Section 504/Title II Coordinator, Donna Dare, at 314-539-5285 for
matters relating to disabilities, or the Title IX Coordinator, Pam McIntyre, at 636-422-2250 for matters relating to sex discrimination.
Sept. 2016

More Related Content

What's hot

Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondNandita Nityanandam
 
Tonex Cybersecurity Fundamentals, Cybersecurity Training and Certification
Tonex Cybersecurity Fundamentals, Cybersecurity Training and CertificationTonex Cybersecurity Fundamentals, Cybersecurity Training and Certification
Tonex Cybersecurity Fundamentals, Cybersecurity Training and CertificationBryan Len
 
Module0&1 intro-foundations-b
Module0&1 intro-foundations-bModule0&1 intro-foundations-b
Module0&1 intro-foundations-bBbAOC
 
Cyber security certification course
Cyber security certification courseCyber security certification course
Cyber security certification coursechandrashekar965278
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesKroll
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber securitySandip Juthani
 
Cyber Risk Quantification for Employees | Safe Security
Cyber Risk Quantification for Employees | Safe SecurityCyber Risk Quantification for Employees | Safe Security
Cyber Risk Quantification for Employees | Safe SecurityRahul Tyagi
 
The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)Kroll
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceCharles Lim
 
The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015Security Innovation
 
Evolution of Security
Evolution of SecurityEvolution of Security
Evolution of SecurityDM_GS
 
The Seven Kinds of Security
The Seven Kinds of SecurityThe Seven Kinds of Security
The Seven Kinds of SecurityVeracode
 
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | EdurekaComputer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | EdurekaEdureka!
 
Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...CCI Training Center
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationE.S.G. JR. Consulting, Inc.
 
Eliminating the Confusion Surrounding Cyber Insurance
Eliminating the Confusion Surrounding Cyber InsuranceEliminating the Confusion Surrounding Cyber Insurance
Eliminating the Confusion Surrounding Cyber InsuranceInternetwork Engineering (IE)
 

What's hot (20)

Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and Beyond
 
Tonex Cybersecurity Fundamentals, Cybersecurity Training and Certification
Tonex Cybersecurity Fundamentals, Cybersecurity Training and CertificationTonex Cybersecurity Fundamentals, Cybersecurity Training and Certification
Tonex Cybersecurity Fundamentals, Cybersecurity Training and Certification
 
Module0&1 intro-foundations-b
Module0&1 intro-foundations-bModule0&1 intro-foundations-b
Module0&1 intro-foundations-b
 
Cyber security certification course
Cyber security certification courseCyber security certification course
Cyber security certification course
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & Responsibilities
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber security
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Cyber Risk Quantification for Employees | Safe Security
Cyber Risk Quantification for Employees | Safe SecurityCyber Risk Quantification for Employees | Safe Security
Cyber Risk Quantification for Employees | Safe Security
 
Cv for ala' zayadeen
Cv for  ala' zayadeen Cv for  ala' zayadeen
Cv for ala' zayadeen
 
Navigating Cybersecurity
Navigating CybersecurityNavigating Cybersecurity
Navigating Cybersecurity
 
The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
 
The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015
 
Evolution of Security
Evolution of SecurityEvolution of Security
Evolution of Security
 
The Seven Kinds of Security
The Seven Kinds of SecurityThe Seven Kinds of Security
The Seven Kinds of Security
 
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | EdurekaComputer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
 
Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...
 
Understanding the Impact of Cyber Security in Health Care
Understanding the Impact of Cyber Security in Health CareUnderstanding the Impact of Cyber Security in Health Care
Understanding the Impact of Cyber Security in Health Care
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Eliminating the Confusion Surrounding Cyber Insurance
Eliminating the Confusion Surrounding Cyber InsuranceEliminating the Confusion Surrounding Cyber Insurance
Eliminating the Confusion Surrounding Cyber Insurance
 

Similar to AAS Cybersecurity 2 pages

Why MSc is Right Choice
Why MSc is Right ChoiceWhy MSc is Right Choice
Why MSc is Right ChoiceEmma Thompson
 
Information Security Analyst- Infosec train
Information Security Analyst- Infosec trainInformation Security Analyst- Infosec train
Information Security Analyst- Infosec trainInfosecTrain
 
BIZGrowth Strategies — Cybersecurity Special Edition 2023
BIZGrowth Strategies — Cybersecurity Special Edition 2023BIZGrowth Strategies — Cybersecurity Special Edition 2023
BIZGrowth Strategies — Cybersecurity Special Edition 2023CBIZ, Inc.
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxInfosectrain3
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxInfosectrain3
 
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...Booz Allen Hamilton
 
Information Security Analyst Resume. When seeking
Information Security Analyst Resume. When seekingInformation Security Analyst Resume. When seeking
Information Security Analyst Resume. When seekingDanielle Bowers
 
Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024Skillogic Solutions
 
Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024Skillogic Solutions
 
Cyber Security Course in Pune March 2024
Cyber Security Course in Pune March 2024Cyber Security Course in Pune March 2024
Cyber Security Course in Pune March 2024Skillogic Solutions
 
Saint Leo University by Study Metro
Saint Leo University by Study MetroSaint Leo University by Study Metro
Saint Leo University by Study MetroAbhishek Bajaj
 
How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..Sprintzeal
 
Cyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptxCyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptxSkillogic Solutions
 
Cyber Security Course in Chennai January 2024
Cyber Security Course in Chennai January 2024Cyber Security Course in Chennai January 2024
Cyber Security Course in Chennai January 2024Skillogic Solutions
 
Cyber Security Course in Chennai February 2024
Cyber Security Course in Chennai February 2024Cyber Security Course in Chennai February 2024
Cyber Security Course in Chennai February 2024Skillogic Solutions
 
Cyber Security Course in Chennai February.pptx
Cyber Security Course in Chennai February.pptxCyber Security Course in Chennai February.pptx
Cyber Security Course in Chennai February.pptxSkillogic Solutions
 
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an UncertaintyCyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an UncertaintyOrganization
 
Cyber Security Course in Bangalore January
Cyber Security Course in Bangalore JanuaryCyber Security Course in Bangalore January
Cyber Security Course in Bangalore JanuarySkillogic Solutions
 
Cyber Security Course in Bangalore February
Cyber Security Course in Bangalore FebruaryCyber Security Course in Bangalore February
Cyber Security Course in Bangalore FebruarySkillogic Solutions
 
Cyber Security Course in Bangalore February 2024.pptx
Cyber Security Course in Bangalore February 2024.pptxCyber Security Course in Bangalore February 2024.pptx
Cyber Security Course in Bangalore February 2024.pptxSkillogic Solutions
 

Similar to AAS Cybersecurity 2 pages (20)

Why MSc is Right Choice
Why MSc is Right ChoiceWhy MSc is Right Choice
Why MSc is Right Choice
 
Information Security Analyst- Infosec train
Information Security Analyst- Infosec trainInformation Security Analyst- Infosec train
Information Security Analyst- Infosec train
 
BIZGrowth Strategies — Cybersecurity Special Edition 2023
BIZGrowth Strategies — Cybersecurity Special Edition 2023BIZGrowth Strategies — Cybersecurity Special Edition 2023
BIZGrowth Strategies — Cybersecurity Special Edition 2023
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptx
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptx
 
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
 
Information Security Analyst Resume. When seeking
Information Security Analyst Resume. When seekingInformation Security Analyst Resume. When seeking
Information Security Analyst Resume. When seeking
 
Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024
 
Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024
 
Cyber Security Course in Pune March 2024
Cyber Security Course in Pune March 2024Cyber Security Course in Pune March 2024
Cyber Security Course in Pune March 2024
 
Saint Leo University by Study Metro
Saint Leo University by Study MetroSaint Leo University by Study Metro
Saint Leo University by Study Metro
 
How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..
 
Cyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptxCyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptx
 
Cyber Security Course in Chennai January 2024
Cyber Security Course in Chennai January 2024Cyber Security Course in Chennai January 2024
Cyber Security Course in Chennai January 2024
 
Cyber Security Course in Chennai February 2024
Cyber Security Course in Chennai February 2024Cyber Security Course in Chennai February 2024
Cyber Security Course in Chennai February 2024
 
Cyber Security Course in Chennai February.pptx
Cyber Security Course in Chennai February.pptxCyber Security Course in Chennai February.pptx
Cyber Security Course in Chennai February.pptx
 
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an UncertaintyCyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
 
Cyber Security Course in Bangalore January
Cyber Security Course in Bangalore JanuaryCyber Security Course in Bangalore January
Cyber Security Course in Bangalore January
 
Cyber Security Course in Bangalore February
Cyber Security Course in Bangalore FebruaryCyber Security Course in Bangalore February
Cyber Security Course in Bangalore February
 
Cyber Security Course in Bangalore February 2024.pptx
Cyber Security Course in Bangalore February 2024.pptxCyber Security Course in Bangalore February 2024.pptx
Cyber Security Course in Bangalore February 2024.pptx
 

AAS Cybersecurity 2 pages

  • 1. Cybersecurity Associate in Applied Science Degree • Certificate of Proficiency A Stimulating and Dynamic Career Information security analysts plan and carry out security measures to protect an organization’s computer networks and systems. Their responsibilities are continually expanding as the number of cyberattacks increases. A career in the St. Louis Community College Cybersecurity Program is right for you if you:  See yourself in a career that offers diverse opportunities.  Would like to work in a growing Information Technology career.  Have aptitude for problem-solving and ingenuity; are analytical, detail oriented.  Enjoy the challenge of lifelong learning. Want a career where you can continually adapt to stay a step ahead of cyberattackers, stay Up to date on the latest methods attackers are using to infiltrate computer systems and on IT security? With experience and security credentials hold solid potential for advancement to management positions, especially when combined with a bachelor’s degree. ABOUTTHEPROGRAM The Cybersecurity program provides the foundation courses to prepare IT students to apply for entry level information assurance/security technician/practitioners positions that support planning, implementing, upgrading, and monitoring security measures for the protection of computer networks and information systems. Students, through in-depth theory and extensive hands-on activities, will develop skills to ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure, and will develop skills to respond to computer security breaches and viruses. Includes instruction in computer architecture, programming, and systems analysis; networking; cryptography; security system design; applicable law and regulations; risk assessment and policy analysis; contingency planning; user access issues; investigation techniques; and troubleshooting. OPPORTUNITIES IN THIS FIELD Most information security analysts work for computer companies, consulting firms, government agencies, healthcare companies and business and financial companies. JOB OUTLOOK According to the U.S. Bureau of Labor Statistics (BLS), job prospects in Information (Cyber) Security are set to grow at a rate much faster than average. Jobs are predicted to increase by 18% before 2024. Information security analysts with related work experience will have the best prospects. SALARY INFORMATION Information Security position salaries vary by geographic location, amount of education and experience, and the type and size of the employer. According to Missouri Economic Research and Information Center, analysts typically earn a mean annual salary of $77,090, in our region, depending on the position, with higher salaries in large metropolitan areas. Students may visit www.missourieconomy.org/oeswage for more local salary information. FEES Pleasevisit www.stlcc.edu/fees for the most current information. Additional fees apply to some courses. Fees are subjectto change. CONTACT INFORMATION Craig Chott, Program Coordinator, 314-644-9298, cchott@stlcc.edu Brenda Kahan, Department Chair, 314-644-9229, bkahan@stlcc.edu
  • 2. Cybersecurity For more information on how to get started on your career go to www.stlcc.edu/getstarted. ASSOCIATE IN APPLIED SCIENCE DEGREE Certificate of Proficiency AAS CP Course Number Course Description Credit Hours General Education __ENG:101 College Composition 1 3 __ENG:102 College Composition II (or) __ENG:103 Report Writing 3 __MTH:140 Intermediate Algebra 3 __MTH:186 Survey of Calculus 4 __XXX:xxx Natural Science/Mathematics Elective 3 __XXX:xxx Missouri State Requirement 3 __XXX:xxx Social Science Elective 3 Total General Education Credit Hours 19 __Physical Education Activity 2 Area of Concentration __IT:100 Introduction to Cybersecurity 1 1 __IS:112 Software and Hardware Concepts 3 3 __IS:139 Web Publishing 3 3 __IS:153 C# Programming I (or) __IS:187 Java Programming I 4 4 __IS:225 Database Management 4 4 __IS:229 Unix/Linux 1 3 3 __IS:237 Fundamentals of Information Assurance/Security 3 3 __IS:265 Web Scripting Technologies 3 3 __IT:101 Cisco Networking I: Introduction to Networks 5 5 __IT:120 Enterprise Security Management 3 3 __IT:121 Secure E-Commerce and E-Government (or) __IS:264 Unix/Linux II 3 3 __IT:212 Ethical Hacking 3 3 __IT:214 Systems Security Engineering 3 3 __IT:216 Digital Forensics 3 3 Total Credit Hours for Program 65 47 Pre-employment background screening is required for any candidate seeking employment in the cybersecurity field. To be successful, persons interested in the program should possess a strong foundation in computer hardware/software troubleshooting skills, equivalent to the CompTIA A+ certification. St. Louis Community College is committed to non-discrimination and equal opportunities in its admissions, educational programs, activities and employment regardless of race, color, creed, religion, sex, sexual orientation, national origin, ancestry, age, disability, genetic information or status as a disabled or Vietnam-era veteran and shall take action necessary to ensure non- discrimination. For information or concerns relating to discrimination matters at a particular location, you may contact the Section 504/Title II Coordinator, Donna Dare, at 314-539-5285 for matters relating to disabilities, or the Title IX Coordinator, Pam McIntyre, at 636-422-2250 for matters relating to sex discrimination. Sept. 2016