To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyses reviews to verify trustworthiness.
To anyone buying this in 2020 or later. Alot of the set up and repo instructions are outdated. It's better to download the tools as they become relevant in the book instead of getting them all from the get go.
This product is a lab-- if you do not have a good computer with which to participate, you shouldn't purchase this product. It reads like a text book, it has step-by-step instructions, and it will definitely teach you some very important and unique CEH type things. That being said, it's not a readable book, it's a project.
Its like anything to get good at it you have to practice and research. This book offers general tricks and theory on how to improve your skills of being a pen-tester "hacker" Security Professional. Its not going to make you l337 overnight. Mr Kim does a great job showing how he exploits systems and networks and easy to use tricks on how to do the same. Over all worth the money definitely recommend. Great book.
the only reason I am giving this book 4 starts rather than 5 is not because it lacks content but because some of the stuff in it either a bit confusing for me or totally new and i don't quite understand it but this is a GREAT book to have.