• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

88 History courses in Christchurch

Definitive VSAT

5.0(3)

By Systems & Network Training

VSAT training course description This 2 day training course examines what VSAT is, its usages and users. It then looks at the hardware required for VSAT. What will you learn Explain how VSAT is used Describe the hardware required for VSAT operation. VSAT training course details Who will benefit: Anyone working with VSAT. Prerequisites: None. Duration 2 days VSAT training course contents Introduction History of PMR VSAT Introduction A Brief History Satellite Services Satellite Communications Satellite Footprint Radio Frequency Bands ITU Definitions VSAT Users What is a VSAT? VSATs - Usage VSATs - Users VSAT Hardware Typical System Hardware VSAT ODU and IDU VSAT Station Equipment Diplexer and Feed Horn Typical Waveguide Element Polarisation VSAT Hub Antenna Pointing Outdoor Unit Outdoor (continued) VSAT Network Earth Stations Indoor Unit VSAT Network Earth Stations Indoor Unit Element Hub Station Hub Sub-station Hub Options Hub Options (2) Hub Options (3) Temporary Mount

Definitive VSAT
Delivered in Internationally or OnlineFlexible Dates
£1,727

Definitive WANs for engineers

5.0(3)

By Systems & Network Training

WAN training course description A hands on Introduction to Wide Area Networks for engineers. This course covers all current major WAN technologies from a perspective of design, evaluating technologies available as well as hands on to consolidate the theory What will you learn Describe the seven-layer model and realise how it applies to the real world. Evaluate and describe WAN technologies. Describe the architecture of WANs in the core. Use WANS to interconnect LANS. WAN training course details Who will benefit: Technical staff wishing to find out more about how their WAN works. Prerequisites: Intro to data communications & networking Duration 5 days WAN training course contents Introduction LANs, MANS and WANS, protocols, the OSI seven layer model, ITU-T, ETSI, DTE, DCE, and the overall picture. WAN architectures Service providers, core, access, DTE, DCE, CPE, dialup, circuit switched, packet switched, how to choose a WAN, common bandwidths, site to site, remote access. Topologies: Star, Full mesh, partial mesh. History of WANs Before IP was ubiquitous, The PSTN, Dial up networks, modems, ISDN, Stat mux, TDM, 64k, N*64, E1, X25, Frame Relay The role of IP and routers The growth of IP, the role of routers, routing tables, routing protocols. Hands on: IP and routing. Layer 1 Physical Copper, Fibre, Wireless, Microwave, Phone lines, FTTC, FTTH, mobile networks. Service provider technologies The transport plane, SDH, SONET, DWDM. WAN access Phone lines, leased lines, xDSL, WiMax, satellite, the role of PPP. Broadband adband xDSL, ADSL, SDSL, local loops, DSLAM, DSL architecture. ATM Cell switching principles, ATM switching, Virtual paths, QOS, CBR, VBR, ABR, UBR, AAL1 to AAL5, MPOA, LANE, Voice over ATM. The Internet VPNs, IPSEC, QOS. What is MPLS? Core MPLS, MPLS and the 7 layer model, MPLS protocol, MPLS standard, MPLS runs on routers, MPLS history, Why MPLS? MPLS architecture LSRs, PE and P router roles, FEC, swapping labels, MPLS packet format, Loops, TTL control. Ethernet What is Ethernet? LANs, MANs, WANs, Ethernet and switches in the LAN. Traditional LAN/WAN integration, routers. The Ethernet interface for the WAN. Standards: Transporting carrier Ethernet.

Definitive WANs for engineers
Delivered in Internationally or OnlineFlexible Dates
£3,697

Certified Wireless Security Professional

5.0(3)

By Systems & Network Training

CWSP training course description A hands-on training course concentrating solely on WiFi security with an emphasis on the delegates learning the necessary knowledge and skills to pass the CWSP exam. The course progresses from simple authentication, encryption and key management onto in depth coverage of 802.X and EAP along with many other security solutions such as access control, intrusion prevention and secure roaming. What will you learn Demonstrate the threats to WiFi networks. Secure WiFi networks. Configure: WPA2 RADIUS 802.1x EAP Pass the CWSP exam. CWSP training course details Who will benefit: Technical network staff. Technical security staff. Prerequisites: Certified Wireless Network Associate. Duration 5 days CWSP training course contents WLAN Security overview Standards, security basics, AAA, 802.11 security history. Hands on WLAN connectivity. Legacy 802.11 security Authentication: Open system, shared key. WEP. VPNs. MAC filters. SSID segmentation, SSID cloaking. Hands on Analysing 802.11 frame exchanges, viewing hidden SSIDs. Encryption Basics, AES, TKIP, CCMP, WPA, WPA2. Hands on Decrypting 802.11 data frames. 802.11 layer 2 authentication 802.1X: Supplicant, Authenticator, Authentication server. Credentials. Legacy authentication. EAP, Weak EAP protocols, Strong EAP protocols: EAP -PEAP, EAP-TTLS, EAP-TLS, EAP-FAST. Hands on Analysing 802.1X/EAP frames. 802.11 layer 2 dynamic key generation Robust Security Network. Hands on Authentication and key management. SOHO 802.11 security WPA/WPA2 personal, Preshared Keys, WiFi Protected Setup (WPS). Hands on PSK mapping. WLAN security infrastructure DS, Autonomous APs, WLAN controllers, split MAC, mesh, bridging, location based access control. Resilience. Wireless network management system. RADIUS/LDAP servers, PKI, RBAC. Hands on 802.1X/EAP configuration. RADIUS configuration. 802.11 Fast secure roaming History, RSNA, OKC, Fast BSS transition, 802.11k. Hands on Roaming. Wireless security risks Rogue devices, rogue prevention. Eavesdropping, DOS attacks. Public access and hotspots. Hands on Backtrack. WiFi security auditing Layer 1 audit, layer 2 audit, pen testing. WLAN security auditing tools. WiFi security monitoring Wireless Intrusion Detection and Prevention Systems. Device classification, WIDS/WIPS analysis. Monitoring. 802.11w. Hands on Laptop spectrum analysers. VPNs, remote access, guest access Role of VPNs in 802.11, remote access, hotspots, captive portal. Wireless security policies General policy, functional policy, recommendations.

Certified Wireless Security Professional
Delivered in Internationally or OnlineFlexible Dates
£3,697

Git and GitHub for engineers

5.0(3)

By Systems & Network Training

Git and GitHub course description This course covers version control using Git but also using GUI frontends such as GitHub. The course starts with a tour of using GitHub but then quickly moves onto using git from the command line. All elements of git version control are covered including creation of repositories, adding and editing files, branches and merging, rewriting history and handling merge conflicts. Hands on sessions are used throughout the course. What will you learn Install git. Add and edit files in a repository. Create branches and perform merges. Handle merge conflicts. Git and GitHub course details Who will benefit: Anyone requiring version control. Prerequisites: None. Duration 1 day Git and GitHub course contents Introduction Version control for software, configuration management. Other uses. Version control systems. What is git? What is GitHub? Distributed version control. Comparison of git to other systems. GitHub Getting started, creating an account, account types, repositories, access control, bug tracking, feature requests. Alternatives to GitHub. Hands on Using GitHub. Installing git Linux install, Windows install, git config, levels, user.name, user.email. Hands on Installing and configuring git. Creating repositories git clone, github, git remote, git init. Hands on Creating a repository. Adding and editing files Staging and adding, git add, git commit, git push, git pull, git status, git log. Two stage process. File states: Working, staging, history, untracked. git mv, git rm, .gitignore, git diff, git difftool. Undoing changes. Hands on Adding and editing files in git. Branching and merging What is a branch, HEAD label, master branch, git branch, git checkout. Feature branches, bux fix branches, integration branches, production branches, fast forward merges, 3 way merges, git merge, git status, git log, tags. Hands on Making branches, merging. Rewriting history git reset, git rebase, advantages. Hands on Reset commits, rebase a branch. Merge conflicts What is a conflict, conflict resolution process, resolving merges, rebasing, git log, merge tools, configuring merge tools, avoiding conflicts. Hands on Merge resolution.

Git and GitHub for engineers
Delivered in Internationally or OnlineFlexible Dates
£797

M.D.D HOW TO HAVE CONFIDENCE PACKAGE (DATING/RELATIONSHIP COURSES)

4.9(27)

By Miss Date Doctor Dating Coach London, Couples Therapy

A training course for those lacking in confidence and suffering from low self-esteem. Confidence and self-esteem issues can have a very detrimental effect on progressing in your dating life and having healthy relationships. This course will consist of a full assessment of your history. emotions, self-belief, dating history, and insight into how to build your confidence and forge a stronger self-belief pattern and supporting you to become a better and more confident person able to face the ups and downs and challenges of daily life and believing in yourself and knowing you can overcome any obstacle in dating, relationships or daily life. Confidence can be lost when we face negative situations but can be regained with indoctrination and social awareness and emotional intelligence education. https://relationshipsmdd.com/product/how-to-have-confidence-package/

M.D.D HOW TO HAVE CONFIDENCE PACKAGE (DATING/RELATIONSHIP COURSES)
Delivered in London or UK Wide or OnlineFlexible Dates
£1,200

Professional Diplomatic Protocol Management

5.0(10)

By GBA Corporate

Overview The protocol is one of the most modern terms in terms of language but very old in terms of history as the word protocol is a development of the word of the conventions and understandings this is in the world of politics and at the international level, but within the field of business management has become the formulation of protocols is one of the important and necessary skills and very necessary for people who wish to They must take administrative duties. Through this course, we are going to introduce the rules and practices of gentle behaviour, the best practices for communication with others, and good reception, since all such related matters represent a large portion of our personality.

Professional Diplomatic Protocol Management
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,779

CWISA Wireless IoT Solutions Administrator

5.0(3)

By Systems & Network Training

CWISA training course description This CWISA course covers wireless technologies with reference to IoT. It examines from an IoT perspective how wireless works, and is an excellent introduction to IoT for the wireless engineer. Topics range from wireless technologies, RF, to mobile networks, IoT, and security. What will you learn Describe wireless networking and IoT technologies. Explain basic RF communications. Plan wireless solutions. Describe how to implement wireless solutions. Use best practices in implementing wireless solutions. CWISA training course details Who will benefit: Anyone working with IoT technologies. Prerequisites: RF fundamentals. Duration 4 days CWISA training course contents Introduction to wireless technologies History of wireless, radio waves and frequencies, wireless technologies and related components, common components of wireless solutions, LAN networking requirements, Network security, Implementing wireless solutions, staging, documentation, security updates, Industry organizations, IEEE, compatibility and certification groups. Wireless network use cases Wireless BANs, Wireless PANs, Wireless LANs, Wireless MANs, Wireless WANs, Wireless sensor networks, New network driver-Internet of Things, IoT for industry (IIoT), IoT for connected vehicles, Residential environments, Retail, Education (K12), Higher education, Agriculture, Smart cities / Public access, Health care, Office buildings, Hospitality, Industry, Stadiums, arenas, and large public venues. Planning wireless solutions Identifying use cases and applications, common wireless requirements and constraints, performing a wireless system design, selecting and evaluating design parameters. RF communications RF wave characteristics, RF propagation behaviours, RF signal metrics, fundamentals of wireless modulation. other wireless carriers, common frequency bands. Radio frequency hardware Hardware levels, basic RF hardware components (circuit board level), RF link types (use category). RF device types. Mobile communications networks Mobile networks, LTE, 5G, Use cases. Short-range, low-rate, and low-power networks RF and speed, RF and range, RF and power, 802.11, 802.15.4, Bluetooth, LoRa (Long range) / LoRaWAN, ZigBee, 6LoWPAN, NB-IoT and LTE-M. Wireless sensor networks What is a Wireless Sensor Network (WSN)? WSN applications, Sensors and actuators, WSN architectures, Planning a WSN. Internet of Things (IoT) Internet of Things (IoT) defined, IoT history and its definition revisited, one more comment on the definition of IoT, IoT verticals, Oil & Gas, IoT structure/ architecture basics, IoT connected objects. Securing wireless networks Confidentiality, integrity and availability, Privacy, non-repudiation, authenticity & safety, Importance of authentication in wireless networks, Key cryptographic technologies & concepts, Authentication methods, Authorisation, OAuth 2.0 authorisation framework, monitoring. Troubleshooting wireless solutions Proper solutions design, designing and implementing wireless solutions, basic installation procedures, general configuration considerations, troubleshooting and remediation, troubleshoot common problems in wireless solutions. Programming, scripting and automation What is an API? categories of APIs, common API communication methods, choosing a language, why are we integrating systems? Application & integration architectures. Data structures & types, XML, YAML, API types.

CWISA Wireless IoT Solutions Administrator
Delivered in Internationally or OnlineFlexible Dates
£2,797

Complete JavaScript

5.0(3)

By Systems & Network Training

Complete JavaScript training course description A hands on course covering JavaScript programming. Core JavaScript is covered first, including the basics, arrays, functions, classes, modules and Regular expressions. Client side JavaScript is then covered including JavaScript in browsers, Scripting CSS, the jQuery library and HTML APIs. What will you learn Read JavaScript. Write JavaScript. Debug JavaScript. Complete JavaScript training course details Who will benefit: Anyone wishing to learn JavaScript. Prerequisites: None. Duration 3 days Complete JavaScript training course contents CORE JAVASCRIPT Lexical structure: Character set, comments, literals, identifiers, and reserved words, optional semicolons.. Types, values and variables: Numbers, text, boolean values, null and undefines, the global object, wrapper objects, immutable primitive values and mutable object references, type conversions, variable declaration, variable scope. Expressions and operators: Primary expressions, object and array initializers, function definition expressions, property access expressions, invocation expressions, object creation expressions, operator overview, arithmetic expressions, relational expressions, logical expressions, assignment expressions, evaluation expressions, miscellaneous operators. Statements: Expression statements, compound and empty statements, declaration statements, conditionals, loops, jumps, miscellaneous statements, summary of JavaScript statements. Objects: Creating objects, querying and setting properties, deleting properties, testing properties, enumerating properties, property getters and setters, property attributes, object attributes, serializing objects, object methods. Arrays: Creating arrays, reading and writing array elements, sparse arrays, array length, adding and deleting array elements, iterating arrays, multi-dimensional arrays, array methods, FCMAScript 5 array methods, array type, array-like objects, strings as arrays. Functions: Defining functions, invoking functions, function arguments and parameters, functions as values, functions as namespaces, closures, function properties, methods and constructor, functional programming. Classes and modules: Classes and prototypes, classes and constructors, Java-style classes in JavaScript, augmenting classes, classes and types, object oriented techniques in JavaScript, subclasses, classes in ECMAScript 5, modules. Pattern matching and regular expressions: Defining regular expressions, string methods for pattern matching, the RegExp object. JavaScript subsets and extensions: JavaScript subsets, constants and scoped variables, destructuring assignment, iteration, shorthand functions, multiple catch clauses, E4X: ECMAScript for XML. Server-side JavaScript: Scripting Java with Rhino, asynchronous I/O with node. CLIENT SIDE JAVASCRIPT JavaScript in web browsers: Client side JavaScript, embedding JavaScript in HTML, execution of JavaScript programs, compatibility and interoperability, accessibility, security, client side frameworks. The Window object: Timers, browser location and navigation, browsing history, browser screen information, dialog boxes, error handling, document elements as window properties, multiple windows and frames. Scripting Documents: Overview of the DOM, selecting document elements, document structure and traversal, attributes, element content, creating, inserting and deleting nodes. Example: generating a table of contents, document and element geometry and scrolling, HTML forms, other document features. Scripting CSS: Overview of CSS, important CSS properties, scripting inline styles, querying computed styles, scripting CSS classes, scripting stylesheets. Handling events: Types of events, registering event handlers, event handler invocation, document load events, mouse events, mousewheel events, drag and drop events, text events, keyboard events. Scripted HTTP: Using XMLHttpRequest, HTTP by <script>: JSOMP, Comet with server-sent events. The jQuery library: jQuery basics, jQuery getters and setters, altering document structure, handling events with jQuery, Animated effects, Ajax with jQuery, Utility functions, jQuery selectors and selection methods, Extending jQuery with plug-ins. The jQuery UI library. Client side storage: localStorage and sessionStorage, Cookies, IE usingData persistence, Applicatioin storage and offline webapps. Scripted media and graphics: Scripting images, Scripting audio and video, SCG:scalable vector graphics, Graphics in a <canvas>. Scripted HTTP: Using XMLHttpRequest, HTTP by <script>: JSOMP, Comet with server-sent events. The jQuery library: jQuery basics, jQuery getters and setters, altering document structure, handling events with jQuery, Animated effects, Ajax with jQuery, Utility functions, jQuery selectors and selection methods, Extending jQuery with plug-ins. The jQuery UI library. Client side storage: localStorage and sessionStorage, Cookies, IE usingData persistence, Applicatioin storage and offline webapps. Scripted media and graphics: Scripting images, Scripting audio and video, SCG:scalable vector graphics, Graphics in a <canvas>. HTMLS APIs: Geolocation, history management, cross-origin messaging, web workers, type arrays and ArrayBuffers, blobs, the filesystem API, client side databases, web sockets.

Complete JavaScript
Delivered in Internationally or OnlineFlexible Dates
£2,367

Essential RFID

5.0(3)

By Systems & Network Training

RFID training course description This training course focuses on the technologies used in Radio Frequency Identification (RFID). What will you learn Describe the RFID architecture. Design RFID systems. Evaluate tag types. Recognise common RFID problems. RFID training course details Who will benefit: RFID technologists and system engineers. Prerequisites: RF fundamentals. Duration 2 days RFID training course contents What is RFID? Review of RF basics, what is RFID, RFID history, RFID base system architecture, frequency bands used by RFID, comparison with barcodes. RFID applications Supply chain, asset tracking, theft reduction, retail, access control, tolls. Tags Tag features, types of tag, passive and active, chips, read only, read write, affixing tags, selecting location to affix a tag, tag orientation and location, tag stacking, impact of rate of movement, tag data formats. Interrogators/readers Interrogation zones, interrogator types, antennas, read distance tests, multiple interrogators, synchronisation, dense interrogator environment issues. RFID peripherals. Standards and regulations Global regulatory requirements, regional regulatory requirements, ISO, ETSI, FCC, EPC, safety regulations/issues. Testing and troubleshooting Read rate problems, improperly tagged items, tag failure. RFID system design Antenna types, interference, antenna location and spacing, how many antennas? How many interrogators? tag types, grounding considerations, cabling, site diagrams.

Essential RFID
Delivered in Internationally or OnlineFlexible Dates
£2,477

Definitive Tetra

5.0(3)

By Systems & Network Training

TETRA training course description This 2 day training course covers the network architecture required for TETRA. It also looks at the Air Interface, TETRA Functions and Procedures. What will you learn Describe the TETRA Architecture Describe the Air Interface Explain the TETRA Functions Explain the TETRA Procedures TETRA training course details Who will benefit: Anyone working with TETRA. Prerequisites: None. Duration 2 days TETRA training course contents Introduction History of PMR, ETSI development, Tetra function, Tetra markets, Tetra standards, Tetra supplier base, Tetra Release 1, Tetra Release 2. Network Architecture Mobile network Identity, Mobile stations, Base station, Switching & Management, Addresses & Identitie. Air Interface Modulation, TDMA Format, FD, Framin, Burst format, Traffic Channel TCH, Dedicated Channel DCC, Common Control Channel CCC, Signalling Channel SCH, Logical Control mapping LCM, Protocol stack, Voice coded. TETRA Functions Trunked mode operation, User hierarchies, Individual calling, Group calling, Supplementary services, Voice and Data, Data services, Direct mode operation, Tetra WAP, Circuit mode priorities, Circuit mode data, Packet mode data, Discrete and Ambient listening. Automatic vehicle locator. TETRA Procedures MS operational modes, Mobility management, Cell selection, Security & Authentication, Decryption options, Cell setup, Channel assignment, Network management - internal, Network management -external, PSTN Gateway, ISDN Gateway, Control Room Gateway.

Definitive Tetra
Delivered in Internationally or OnlineFlexible Dates
£2,477
123...9

Educators matching "History"

Show all 9
Shine Cancer Support

shine cancer support

5.0(39)

Poole

Shine is the only UK charity that support adults in their 20s, 30s and 40s who have experienced a cancer diagnosis. There is never a good time to have cancer, but we know that younger adults face different issues than their older or younger counterparts. Many of these are not dealt with by traditional cancer support charities and services. Our vision, mission and strategy In January 2022, we finalised a new five-year strategy. We have updated our vision and mission statements and articulated our values. We will use these to underpin five strategic objectives that will guide Shine’s focus and attention between 2022 and 2027. Vision We want every adult in their 20s, 30s and 40s who is diagnosed with cancer to know they’re not alone, and to have the support, knowledge, and confidence to navigate whatever cancer throws their way. Mission There’s never a good time for a cancer diagnosis, but in your 20s, 30s or 40s there are particular challenges to navigate, like work, dating, finances and more. At Shine, we’ve been there and we get it. We’re here to help you deal with everything that your diagnosis brings, before, during and after treatment, and to welcome you into our community. Our values Inclusive – Our services are open to anyone in their 20s, 30s and 40s with a cancer diagnosis, no matter what type or stage, when your diagnosis was, or what your background is. Approachable – We want everyone in Shine’s community to feel welcomed and to feel able to get involved, and we design all our services to be friendly, fun and down-to-earth. Authentic – We’re patient-led and passionate, and we want everyone involved to have a genuine and honest voice, with patients at the heart of our work. Innovative – As a small charity, we’re adaptable and agile, and we are responsive to needs as they change. We listen to what Shine’s community is saying and strive to find practical solutions. Empowering – Our services aren’t about us “doing” to or “for” you. We want to empower you to ask the right questions, get the right information, take control, and make the best decisions for yourself. Our strategic objectives Connect – build a nationwide community of younger adults with cancer and the people around them, reducing isolation and supporting their physical and mental well-being. Inform – ensure that younger adults with cancer have access to the knowledge and support they need to make the best decisions for them. Influence – grow our influencing position and partnerships to shape a healthcare system and wider support that is suitable for the needs of young adults with cancer. Reach – increase the profile and reach of Shine, aiming for every young adult diagnosed with cancer to have access to our services and support. Build – invest in Shine’s internal capacity, governance and sustainability to build firm foundations for growth. Our goal is for these strands to come together to enable better wellbeing for younger adults with cancer, improved relationships and less isolation, more informed decision-making, and systems that are better able to meet our community’s needs. Our history Shine started in Dorset in 2008 as a non-traditional support group for young adults. Emma and Justine were both diagnosed with cancer at a young age and had a hard time finding others that the could relate to. They realised there was a huge lack of support for younger adults with cancer and the idea for Shine was born. Within the first year, they had connected with over 100 young adults in Dorset. In 2010, Emma met Ceinwen. They launched Shine in London and the UK’s first research into the unmet needs of young adults diagnosed with cancer. Ceinwen and Emma then developed events and activities that would support the gaps identified in the research. Shine was registered as a charity in 2012, and has since supported thousands across the UK Shine has local Shine Networks across the UK and runs a number of annual events including Shine Camp, the Great Escape retreat, and Shine Connect, the UK’s only conference for young adults with cancer. Shine also runs a number of highly-rated workshops on topics such as working after cancer and managing anxiety and depression. As a patient-led organisation, Shine works hard to ensure that young adults with cancer play a key role in the design and delivery of all activities. Shine is supported by a Board of Trustees as well as a patron, Oliver Spencer, and a number of corporate supporters including TTA and Travel Insurance Facilities.

Stonebridge Associated Colleges

stonebridge associated colleges

4.0(419)

Bournemouth

Stonebridge Associated Colleges is a team of bright and motivated people dedicated to helping learners fulfil their potential and meet their career goals. Set up in 1995, Stonebridge Associated Colleges was initially intended to help people qualify in complementary therapies, such as reflexology and aromatherapy. Gradually, it moved towards more mainstream practices such as teaching, nursing, healthcare, business, nutrition and beauty. Some of the students we helped went on to study Marine Biology at university. Others have chosen teaching assistant courses that have landed them an early promotion. As their needs diversified, so did our curriculum. Two decades later the college became a leading name in the world of further education. Today, Stonebridge Associated Colleges has training facilities in Bude and Birmingham for a few of our vocational courses where our experienced tutors bring a hands-on approach to the teaching. However, there are over 650 online courses that can be completed remotely from anywhere in the world. With 50,000 students currently enrolled, the college is one of the largest distance learning suppliers in the UK. A dedicated support team is also on hand to address student questions regarding enrolment, finances and guidance on the best-suited courses for you. Today we are proud to be part of The Stonebridge Group, a number of companies operating in the distance learning field for both government-subsidised and commercially-funded qualifications.

Patchway Dragon Tang Soo Do

patchway dragon tang soo do

Bournemouth

Dragon Tang Soo Do is an Association of friendly family martial arts clubs based predominantly in the South West of England. Tang Soo Do is a traditional Korean martial art which teaches self-defence, fighting skills and weapons, in addition, its many benefits also act as a guide to allow people to live a healthy and harmonious life. Incorporated within the Association is a Japanese based style of martial arts called Wado Ryu. These clubs which are based in Bournemouth joined the Association in 2004 and share our ethos, values and aims. Together we are a strong, united and friendly group of like minded martial artists keen to improve our knowledge and pass on our skills and experience to others. Our clubs cater for people with a wide range of abilities and ages (5 years and above), so whether you want to train to improve your fitness and health, or are keen to learn how to defend yourself, or simply want to find a hobby to relieve stress and make new friends, then we maybe for you! We live in challenging times and nowadays, increasing numbers of people are learning to protect themselves and their families, our martial arts are a very effective tried and tested method of self-defence. However there are many other reasons why men, women and children train with us, our martial art also provides skills such as self-confidence, self-discipline, physical fitness, flexibility, co-ordination and respect, skills that help us all to cope better with the pressures of everyday life. The real benefits of Dragon Tang Soo Do are not the coloured belts you earn, but the positive changes that you will experience, the enhancement of your mind, body and spirit as well as the development of individual character and respect for others. The true goal of Dragon Tang Soo Do is to use the lessons you learn in class to enrich every part of your life. Our Vision The vision of Dragon Tang Soo Do is one where people can practice the Martial Arts in a safe and controlled environment. Dragon Tang Soo Do will strive to retain the important traditional aspects of our style, whilst being adaptable and open to new techniques and ideas. Our Instructors and senior grades will endeavour to provide instruction and guidance in a way that does not prejudice any student and will enhance the development of all, both in and out of the Dojang and Dojo (Training Halls). It is important that people enjoy the learning experience provided by Dragon Tang Soo Do. Goals To develop an individual’s mental and physical health. To build confidence in all who train with us. To have a reputation as an organisation of quality martial artists. To provide scheduled events to support the development of all. To set and maintain high standards. To build healthy relationships with other martial art organisations, in the interest of sharing best practices and continually developing the level of knowledge of the instructors and senior members. To maintain a balance between organisational cost effectiveness and the cost to the practitioner. To provide a challenging, fun environment that keeps the safety of all in mind. Diversity Every single person counts and everyone has a justifiable expectation to be treated with dignity and respect. That’s why through our ‘vision and goals’ the Directors, Masters and Instructors of Dragon Tang Soo Do are committed to ensuring that our Association respects and celebrates diversity and that all members are helped and encouraged to reach their full potential. Central to this we accept that we are all different and believe that everyone should be treated in an honest, fair and transparent manner in which their individuality should be celebrated and not used as a possible means of discrimination or barrier to achievement. If you feel there is anything more we can do to improve the way we treat our students then please speak to an Instructor, Master, Director or Master Thomas our Diversity Lead. History of Tang Soo Do The very first evidence of this ancient form of Korean martial arts appeared during the Three Kingdom era (57 BC-935 AD) as Hwa Rang Do. Since then, 2,000 years have passed. The indigenous martial arts quietly developed through generations of the Korean people. During some eras it flourished and other times it diminished, according to the political, economic or cultural environment. The art was known by various names throughout the eras, such as Hwa-Rang Do, Kyuck Too Ki, Moo Sul, Soo Bahk Ki, Soo Byuck Ki, and others. Following 1945 Korean independence, the Korean martial arts were again merged and flourished throughout the entire Korean Peninsula. Many organisations were founded with various names such as Soo Bahk Do, Tang Soo Do, Tae Soo Do, etc… At the beginning of the modern era of the Korean martial arts, Tang Soo Do was the most popular term for these arts. However, at that time, the Korean political leader was concerned about establishing Korean value based on Korean nationalism. The political leaders recognized the popularity of Korean martial arts around the world, but were opposed to the use of the name Tang Soo Do for the art, as it sounded like a Chinese martial art, because the first word “Tang” could be interpreted as representing the Chinese Tang Dynasty (617-907 AD). In 1964, a government sponsored small group created a new name for the Korean martial arts: Tae Kwon Do. We still respect the original term, Tang Soo Do, and intend to preserve its heritage and value as a traditional way or path. Unfortunately, many Tae Kwon Do instructors did not maintain the traditional values of the true martial arts. Instead, they converted to a sport as they have progressed to the internationally recognized sports arenas such as the Olympic games. This was considered to be a great political achievement, to bring strength and prominence to the Korean government in International politics. True Martial Arts lovers had no place within these Tae Kwon Do dojangs (Training Halls) to continue to pursue traditional martial arts because they abandoned many valuable aspects of true Martial Arts to become a simple competitive sport. We, as Tang Soo Do practitioners are striving to maintain traditional values of respect, dicipline, self control, self improvement, etiquette and ultimately live a healthy and harmonious life, physically and mentally. History of Wado Ryu It would be very difficult to trace the original roots of karate back to their inception, however it is believed that the Okinawan Islands off the Japanese coast were the birth place of the art practiced across the world today. Despite the strong links to Japan, the original name was “Chinese hand" or "Tang hand" which during the early part of the 1900s, the Japanese changed to Kara-te “open” or “empty hand” Wado Ryu is one of the four most popular karate styles practiced today, in comparison with others, it is relatively modern with the founder Hironori Ohtsuka, who had studied other forms of martial arts previously, introducing Wado Ryu in Tokyo around the mid 1930s. It wasn’t until 1965 that it was introduced to the United Kingdom by Tatsuo Suzuki. Our Clubs in Bournemouth have been operating since 1992 and we work hard to maintain the traditions and techniques as outlined by the Founder.