Why use passwords?
Strong vs weak
Limitations
Social engineering
Rainbow tables / hash tables
Salting & Hashing
Hashing
Salting
2FA
Two Factor Authentication
Alternatives
Physical Tokens
Biometrics
Strong vs weak
Social engineering
Rainbow tables / hash tables
Hashing
Salting
Two Factor Authentication
Physical Tokens
Biometrics