Strong vs weak
Social engineering
Rainbow tables / hash tables
Hashing
Salting
Two Factor Authentication
Physical Tokens
Biometrics
Notifications