Yes, in the output of that command you will see a section with
-----BEGIN CERTIFICATE----- and
-----END CERTIFICATE-----. If you paste that into
openssl x509 -text -noout, you’ll see all of the details about the server that the remote end sent. Alternatively, you can just do this in a single pipeline like
true | openssl s_client -connect example.com:443 -servername example.com | openssl x509 -text -noout
true | openssl s_client -connect example.com:443 -servername example.com | openssl x509 -dates -noout
to see only the validity dates.
There are lots of other details about how to simulate specific browser/client behaviors and how to interpret the data contained in the certificate, but hopefully this will be helpful to you for now!