Some of the highlights for me when reading this book during the weekend was learning how to set up an Active Directory red team lab, learning about password-based attacks, applications on Kali Linux such as Nmap and Metasploit, and different search engines such as Censys.
Additionally, I liked reading chapters regarding Vulnerability Assessments, Post-Exploitation Techniques, OSINT, Active Directory Attacks, and web application scanners. Overall, I think this book has a lot of extensive content that can be a potential investment for those interested in learning about Linux (including beginners) and red teaming techniques as well as practicing how to build your own virtual lab environment.