So will it be difficult to find the password from either brute force
attack or rainbow tables?
Short answer: No, if the password is weak, then it'll probably be quite easy to break it. A brute-force attack (trying all character combinations of various lengths) will work for short passwords and a dictionary lookup will work for longer, but common passwords and words.
But that's not the point of salting your hashes: The point is that if you don't re-use salts, an attacker would have to brute-force each password one by one. And using multiple iterations makes it more costly to brute-force them. So it's really a matter of gaining time to warn your users (and let them change their passwords) when you are breached.
Note that a rainbow table attack isn't possible with salts: A rainbow table is essentially a pre-hashed table of many many possible passwords, that makes if very fast to find matches. So with a salt that won't work, again, an attacker would have to create the rainbow table for every salt in your database, which defeats the purpose of these tables.
TL;DR Your users should still use strong passwords, that are difficult/impossible to brute-force.