TL;DR
Overall a good class with some startup burps. Informative, and not too heavy (good for Summer semester, or pairing with another class).
Staff
The faculty of the class are actual security professionals from the Ga Tech staff, which made this class much more down to earth than some. The lectures were a mix of case studies and information-blasts about security operations and incident response. I rather enjoyed all of them; the case studies were interesting and well presented, and the general secops/ir information was not merely academic theory. The presentation was also quite good, with some humor injected here and there to keep it interesting and not boring.
Assignments
The assignments consisted of case study writeups, class/group discussions, individual projects, and 1 group project. No quizzes nor tests.
The case study writeups were all of the form, "Based on the case study lecture + papers, ...(2-4 questions)". These writeups could evidently be quite short, as I got perfect marks on all of them and they kept getting shorter as the class wore on; I suspect they were checking to see if you watched/read the material at all, but also required some of your own opinion and thought since many of the questions were of the "what would you do", "what do you think about" format.
The class discussions I didn't get much value from; every iteration a new member of your group is nominated to bring up a subject, and then you discuss it in an online forum. It was clear that at least with my group the workflow was to read something someone wrote, then write some response to it, just to get the points. It felt like a very much 'write-only' forum, but this will vary depending on your group, of course.
The projects were (mostly) fun and relevant.
Project 1 is to look at actual logs of a web server compromise and explain what happened. Although Splunk was encouraged (since it's the right tool for the job), it was not required. A writeup of what you found is the deliverable.
Project 2 is to take the data from Project 1, and format it in a standard Incident Response format, which is discussed in the lectures. Of course, doing this is also acceptable for P1 so you can knock 2 out in one go. The one difference is that you are given essentially all the answers for Project 1, so if you weren't able to find the exploit (or did it incorrectly) you are required in P2 to use the actual compromise findings.
The (infamous) Project 3. This project was to describe how the internet works; colloquially, "what happens when you type in www.gatech.edu into a browser?" Unfortunately this project was so ill concieved as to be a hugh stain on an otherwise enjoyable class. Essentially, the rubric on what you were to be covering was a mess; it was vague and unordered, provoked 10x more questions than it answered, and turned out to be a red herring. A clearly hastily-written mail was sent with the grades explaining what they were looking for, which contained things so bizarrely out of left field that it is beyond reason as to where they originated with very few of them even related to "what happens when you type www.gatech.edu into a browser?". The one people refer to most often was The Kaminsky DNS Attack. While that's an interesting subject, it's not really what they SAID they were asking for.
After some anguish and outcry in both slack and piazza, a clarification was sent explaing the mail were things that SOME PEOPLE put in their papers that caused them to get more points, rather than these were requirements that lost you points if you didn't have them. Since there was no actual feedback on the paper itself (boo!), I remain unconvinced.
The problem with this project is that they were looking for essentially the textbook of the Computer Networking class, but didn't tell you that. The amount of research and information you COULD have put into the project was enough to BE a full textbook, but they didn't set expectations very well, and the absurd directions that evidently some people went into skewed the grading. Even with a huge curve, the disparity in grades was enormous, which indicates that the instructions were very unclear, to almost everyone. This project needs SERIOUS REWORK.
Project 4 is to write some Snort rules for various scenarios. These were very straightforward, and even having zero Snort experience I found it pretty stress-free.
The group project is to role-play an IR team; the group is given a compromise scenario and must come up with what happened and document it. Group dynamics aside, this was a pretty cut and dry exercise. The staff role plays the IT team of the mythical company so part of the project is to figure out what extra information you need for your investigation and ask them for it, so they can role-play the crusty neckbeards if they want. (We found that if you didn't ask for something overly broad, the requests were handled well and quickly.)